National Library of Energy BETA

Sample records for manager database authentication

  1. DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING

    E-Print Network [OSTI]

    Cortesi, Tino

    DATABASE AUTHENTICATION BY DISTORTION FREE WATERMARKING Sukriti Bhattacharya and Agostino Cortesi@dsi.unive.it, cortesi@unive.it Keywords: Database watermarking, ZAW, Public key watermark, Abstract interpretation the verification of integrity of the relational databases by using a public zero distortion authentication

  2. Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin Kupcu

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Database Outsourcing with Hierarchical Authenticated Data Structures Mohammad Etemad Alptekin K database scheme, the data owner delegates the data management tasks to a remote service provider. At a later time, the remote service is supposed to answer any query on the database. The essential

  3. Lecture Notes Database Management

    E-Print Network [OSTI]

    O'Neil, Patrick

    SQL Programs. Embedded SQL means SQL statements embedded in host language (C in our case). The original idea was for end-users to access a database through SQL. Called casual users. But this is not a good idea. Takes too much concentration. Can you picture airline reservation clerk doing job with SQL

  4. Secure Authentication and Session State Management for Web Services

    E-Print Network [OSTI]

    Young, R. Michael

    Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young #12;Lehman 1 1. Introduction Web services protocol. In a web service, the server invokes a function based on the message sent from the client

  5. System and method for authentication

    DOE Patents [OSTI]

    Duerksen, Gary L.; Miller, Seth A.

    2015-12-29

    Described are methods and systems for determining authenticity. For example, the method may include providing an object of authentication, capturing characteristic data from the object of authentication, deriving authentication data from the characteristic data of the object of authentication, and comparing the authentication data with an electronic database comprising reference authentication data to provide an authenticity score for the object of authentication. The reference authentication data may correspond to one or more reference objects of authentication other than the object of authentication.

  6. MINERVA DATABASE Guidelines for Managing Intercollegiate Classes

    E-Print Network [OSTI]

    MINERVA DATABASE Guidelines for Managing Intercollegiate Classes The database can be accessed at http://minerva.maths.ox.ac.uk/ Minerva is a shared database run by the department for tutors, TAs enter reports on the attendance and marks of their students into the database. This should be done after

  7. U-168: EMC Documentum Information Rights Management Server Bugs Let Remote Authenticated Users Deny Service

    Broader source: Energy.gov [DOE]

    Two vulnerabilities were reported in EMC Documentum Information Rights Management Server. A remote authenticated user can cause denial of service conditions.

  8. T-606: Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data

    Broader source: Energy.gov [DOE]

    Sun Java System Access Manager Lets Remote Users Partially Modify Data and Remote Authenticated Users Partially Access Data.

  9. Construction of file database management

    SciTech Connect (OSTI)

    MERRILL,KYLE J.

    2000-03-01

    This work created a database for tracking data analysis files from multiple lab techniques and equipment stored on a central file server. Experimental details appropriate for each file type are pulled from the file header and stored in a searchable database. The database also stores specific location and self-directory structure for each data file. Queries can be run on the database according to file type, sample type or other experimental parameters. The database was constructed in Microsoft Access and Visual Basic was used for extraction of information from the file header.

  10. T-614: Cisco Unified Communications Manager Database Security...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    14: Cisco Unified Communications Manager Database Security Vulnerability T-614: Cisco Unified Communications Manager Database Security Vulnerability May 3, 2011 - 7:37am Addthis...

  11. EERE Project Management Center Database PIA, The Office of Energy...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Project Management Center Database PIA, The Office of Energy Efficiency and Renewable Energy (EERE) EERE Project Management Center Database PIA, The Office of Energy Efficiency...

  12. V-036: EMC Smarts Network Configuration Manager Database Authentication

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeedofDepartment ofDeployment |Energyand LetBypass

  13. Change Management in Heterogeneous Semistructured Databases (Demonstration Description) \\Lambda

    E-Print Network [OSTI]

    Chawathe, Sudarshan S.

    Change Management in Heterogeneous Semistructured Databases (Demonstration Description) \\Lambda the trigger should fire. At Stanford we are addressing the problem of change management in heterogeneous TDIFF CORE QSS Tsimmis Figure 1: Components of our change management system subscribers of changes

  14. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins

    2009-09-01

    To facilitate the implementation of the Risk Management Plan, the Next Generation Nuclear Plant (NGNP) Project has developed and employed an analytical software tool called the NGNP Risk Management System (RMS). A relational database developed in Microsoft® Access, the RMS provides conventional database utility including data maintenance, archiving, configuration control, and query ability. Additionally, the tool’s design provides a number of unique capabilities specifically designed to facilitate the development and execution of activities outlined in the Risk Management Plan. Specifically, the RMS provides the capability to establish the risk baseline, document and analyze the risk reduction plan, track the current risk reduction status, organize risks by reference configuration system, subsystem, and component (SSC) and Area, and increase the level of NGNP decision making.

  15. NGNP Risk Management Database: A Model for Managing Risk

    SciTech Connect (OSTI)

    John Collins; John M. Beck

    2011-11-01

    The Next Generation Nuclear Plant (NGNP) Risk Management System (RMS) is a database used to maintain the project risk register. The RMS also maps risk reduction activities to specific identified risks. Further functionality of the RMS includes mapping reactor suppliers Design Data Needs (DDNs) to risk reduction tasks and mapping Phenomena Identification Ranking Table (PIRTs) to associated risks. This document outlines the basic instructions on how to use the RMS. This document constitutes Revision 1 of the NGNP Risk Management Database: A Model for Managing Risk. It incorporates the latest enhancements to the RMS. The enhancements include six new custom views of risk data - Impact/Consequence, Tasks by Project Phase, Tasks by Status, Tasks by Project Phase/Status, Tasks by Impact/WBS, and Tasks by Phase/Impact/WBS.

  16. Towards Eco-friendly Database Management Systems

    E-Print Network [OSTI]

    Lang, Willis

    2009-01-01

    Database management systems (DBMSs) have largely ignored the task of managing the energy consumed during query processing. Both economical and environmental factors now require that DBMSs pay close attention to energy consumption. In this paper we approach this issue by considering energy consumption as a first-class performance goal for query processing in a DBMS. We present two concrete techniques that can be used by a DBMS to directly manage the energy consumption. Both techniques trade energy consumption for performance. The first technique, called PVC, leverages the ability of modern processors to execute at lower processor voltage and frequency. The second technique, called QED, uses query aggregation to leverage common components of queries in a workload. Using experiments run on a commercial DBMS and MySQL, we show that PVC can reduce the processor energy consumption by 49% of the original consumption while increasing the response time by only 3%. On MySQL, PVC can reduce energy consumption by 20% wit...

  17. Meta Object Management and its Application to Database Evolution ?

    E-Print Network [OSTI]

    Scholl, Marc H.

    Meta Object Management and its Application to Database Evolution ? Markus Tresch and Marc H. Scholl evolution, that is, realizing incremental changes to the database schema and their propagation to data objects, and how this approach can be used to build a complete tool for database evolution. 1 Introduction

  18. Proposed database model and file structures for arthropod collection management

    E-Print Network [OSTI]

    Miller, Scott

    the context of a single data management system. The value of this linkage is that it permits developers who. In some mainframe based database management systems, it is possible to define repeating subsets of information as part of a single database file structure. However, few personal computer-based systems have

  19. Managing and Querying Transaction-time Databases under Schema Evolution

    E-Print Network [OSTI]

    Zaniolo, Carlo

    problem of managing the history of database in- formation is now made more urgent and complex by fast by intro- ducing two key pieces of new technology. The first is a method for publishing the history evolution history. 1. INTRODUCTION The ability of archiving past database information and supporting

  20. Flash Device Support for Database Management Philippe Bonnet

    E-Print Network [OSTI]

    have a reference DBMS design nor a performance model for flash devices: database researchers devices should support database management. We ad- vocate that flash devices should provide DBMS with more a DBMS to explicitly control IO behavior. We believe that these approaches are natural evolutions

  1. DOE technology information management system database study report

    SciTech Connect (OSTI)

    Widing, M.A.; Blodgett, D.W.; Braun, M.D.; Jusko, M.J.; Keisler, J.M.; Love, R.J.; Robinson, G.L.

    1994-11-01

    To support the missions of the US Department of Energy (DOE) Special Technologies Program, Argonne National Laboratory is defining the requirements for an automated software system that will search electronic databases on technology. This report examines the work done and results to date. Argonne studied existing commercial and government sources of technology databases in five general areas: on-line services, patent database sources, government sources, aerospace technology sources, and general technology sources. First, it conducted a preliminary investigation of these sources to obtain information on the content, cost, frequency of updates, and other aspects of their databases. The Laboratory then performed detailed examinations of at least one source in each area. On this basis, Argonne recommended which databases should be incorporated in DOE`s Technology Information Management System.

  2. Flexible Analysis of Plant Genomes in a Database Management System

    E-Print Network [OSTI]

    Teubner, Jens

    Flexible Analysis of Plant Genomes in a Database Management System Sebastian Dorok Bayer Pharma AG.de Gunter Saake University of Magdeburg Germany gunter.saake@ovgu.de ABSTRACT Analysis of genomes has a wide, a typical use case is comparing two plant genomes and try to deduce which genes are responsible

  3. Design, implementation, and benchmarking of a file manager for a relational database management system on a raw UNIX disk 

    E-Print Network [OSTI]

    Narayanan, Pudugramam Shanker

    1994-01-01

    The file management component of a database management system (DBMS) has to be tailor designed to meet the performance demands of large database applications. The operating system (OS) file systems are typically not suitable for storing...

  4. The Oil and Natural Gas Knowledge Management Database from NETL

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Knowledge Management Database (KMD) Portal provides four options for searching the documents and data that NETL-managed oil and gas research has produced over the years for DOE’s Office of Fossil Energy. Information includes R&D carried out under both historical and ongoing DOE oil and gas research and development (R&D). The Document Repository, the CD/DVD Library, the Project Summaries from 1990 to the present, and the Oil and Natural Gas Program Reference Shelf provide a wide range of flexibility and coverage.

  5. Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis

    E-Print Network [OSTI]

    Cho, Junghoo "John"

    Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis Alexandros Ntoulas, to model database changes over time and predict when we should update each content sum- mary. Finally, we-accessible text databases. "Metasearchers" pro- vide unified interfaces to query multiple such databases at once

  6. Scientific Workflow Management by Database Management Anastassia Ailamaki Yannis E. Ioannidis Miron Livny

    E-Print Network [OSTI]

    Ailamaki, Anastassia

    and their interrelationships. Current Workflow Manage- ment Systems (WFMSs) use a Database Management Sys- tem (DBMS) to store task descriptions, and implement all workflow functionality in modules that run on top of the DBMS. Motivated by scientific workflows, we propose a much more DBMS-centric architecture, in which conven- tional

  7. Center for Ecological Management of Military Lands 1 LCTA Relational Database

    E-Print Network [OSTI]

    Center for Ecological Management of Military Lands 1 LCTA Relational Database Center for Ecological Management of Military Lands No. 5 - 1997 The LCTA data is stored in a relational database, currently SQLBase from Gupta Technologies Inc. To the inexperienced user the LCTA database can seem very complex with 45

  8. Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis

    E-Print Network [OSTI]

    Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis Alexandros Ntoulas" techniques in general, and Cox's proportional hazards re- gression in particular, to model database changes Abstract Large amounts of (often valuable) information are stored in web-accessible text databases

  9. Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Pair-wise Cryptographic Models for Secure Data Exchange in P2P Database Management Systems Sk. Md, University of Tsukuba, Tsukuba, 305-8573 Japan okamoto@risk.tsukuba.ac.jp ABSTRACT A peer-to-peer database augments a conventional database man- agement system with an inter-operability layer (i.e. map- pings

  10. Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis

    E-Print Network [OSTI]

    Gravano, Luis

    Modeling and Managing Content Changes in Text Databases Panagiotis G. Ipeirotis panos@nyu.edu New hazards re- gression in particular, to model database changes over time and predict when we should update regression model [10], we show that database characteristics can be used to predict the pattern of change

  11. SQL is the language for accessing and managing database. Using SQL proficiently is essential for a database programmer. This part introduces fundamentals of SQL,

    E-Print Network [OSTI]

    Liang, Y. Daniel

    Part II SQL SQL is the language for accessing and managing database. Using SQL proficiently is essential for a database programmer. This part introduces fundamentals of SQL, advanced features of SQL, creating database objects, and how to use SQL to manage transactions, control concurrency, and maintain

  12. Development of Energy Consumption Database Management System of Existing Large Public Buildings 

    E-Print Network [OSTI]

    Li, Y.; Zhang, J.; Sun, D.

    2006-01-01

    The statistic data of energy consumption are the base of analyzing energy consumption. The scientific management method of energy consumption data and the development of database management system plays an important role in building energy...

  13. 3. Database management David Keil Introduction to Information Technology Spring 2015 David M. Keil, Framingham State University

    E-Print Network [OSTI]

    Keil, David M.

    3. Database management David Keil Introduction to Information Technology Spring 2015 David M. Keil, Framingham State University CSCI 120 Introduction to Information Technology 3. Database management David Keil Introduction to Information Technology Spring 2015 2 #12;3. Database management David Keil Introduction

  14. Database Requirements for Workflow Management in a HighThroughput Genome Laboratory 1

    E-Print Network [OSTI]

    Bonner, Anthony

    and operationally efficient. A key component of this software is a database management system (DBMS) for controlling and tracking workflow activity. This DBMS maintains a record of what happened in the laboratory. This record the requirements of this DBMS. The discussion centers on LabFlow­1 [3, 2], a recently developed database benchmark

  15. Evaluating the Effectiveness of Fault Tolerance in Replicated Database Management Systems

    E-Print Network [OSTI]

    -Olaf.Hvasshovd@idi.ntnu.no Abstract Database management systems (DBMS) achieve high availabilityand faulttolerance usuallyby of this study is two-fold. It eval- uates the effectiveness of DBMS fault tolerance in the pres- ence on database integrity, performance, and availability on a replicated DBMS, ClustRa[6], in the presence

  16. Identity and Discernibility of Objects: Configuration Change Management in P.L.M and Database Systems

    E-Print Network [OSTI]

    Paris-Sud XI, Université de

    1 Identity and Discernibility of Objects: Configuration Change Management in P.L.M and Database changes specifically addressed by Product Lifecycle Management systems are examined in the context of fast is relatively and conditionally redefined. The strategies for managing configuration changes are optimized using

  17. Databases

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room NewsInformation Current HAB Packet HanfordDOEDaniel Shechtman andDarkIDDatabases Databases

  18. KNOWLEDGE DISCOVERY IN DATABASES FOR CUSTOMER RELATIONSHIP MANAGEMENT

    E-Print Network [OSTI]

    Spronck, Pieter

    sector in Egypt. This area of research is closely related to the research areas of Data Mining (DM of intelligent knowledge engineering in the banking sector in Egypt. KEYWORDS: Knowledge discovery in databases of new technologies, have contributed to the growth of customer's power. Customers may switch banks

  19. U-212: RSA Authentication Manager Flaws Permit Cross-Site and...

    Office of Environmental Management (EM)

    Cross-Site Scripting Attacks U-129: RSA enVision Bugs Permit Cross-Site Scripting, SQL Injection, and Directory Traversal Attacks V-026: RSA Data Protection Manager Bugs...

  20. Generic Natural Systems Evaluation - Thermodynamic Database Development and Data Management

    SciTech Connect (OSTI)

    Wolery, T W; Sutton, M

    2011-09-19

    Thermodynamic data are essential for understanding and evaluating geochemical processes, as by speciation-solubility calculations, reaction-path modeling, or reactive transport simulation. These data are required to evaluate both equilibrium states and the kinetic approach to such states (via the affinity term or its equivalent in commonly used rate laws). These types of calculations and the data needed to carry them out are a central feature of geochemistry in many applications, including water-rock interactions in natural systems at low and high temperatures. Such calculations are also made in engineering studies, for example studies of interactions involving man-made materials such as metal alloys and concrete. They are used in a fairly broad spectrum of repository studies where interactions take place among water, rock, and man-made materials (e.g., usage on YMP and WIPP). Waste form degradation, engineered barrier system performance, and near-field and far-field transport typically incorporate some level of thermodynamic modeling, requiring the relevant supporting data. Typical applications of thermodynamic modeling involve calculations of aqueous speciation (which is of great importance in the case of most radionuclides), solubilities of minerals and related solids, solubilities of gases, and stability relations among the various possible phases that might be present in a chemical system at a given temperature and pressure. If a phase can have a variable chemical composition, then a common calculational task is to determine that composition. Thermodynamic modeling also encompasses ion exchange and surface complexation processes. Any and all of these processes may be important in a geochemical process or reactive transport calculation. Such calculations are generally carried out using computer codes. For geochemical modeling calculations, codes such as EQ3/6 and PHREEQC, are commonly used. These codes typically provide 'full service' geochemistry, meaning that they use a large body of thermodynamic data, generally from a supporting database file, to sort out the various important reactions from a wide spectrum of possibilities, given specified inputs. Usually codes of this kind are used to construct models of initial aqueous solutions that represent initial conditions for some process, although sometimes these calculations also represent a desired end point. Such a calculation might be used to determine the major chemical species of a dissolved component, the solubility of a mineral or mineral-like solid, or to quantify deviation from equilibrium in the form of saturation indices. Reactive transport codes such as TOUGHREACT and NUFT generally require the user to determine which chemical species and reactions are important, and to provide the requisite set of information including thermodynamic data in an input file. Usually this information is abstracted from the output of a geochemical modeling code and its supporting thermodynamic data file. The Yucca Mountain Project (YMP) developed two qualified thermodynamic databases to model geochemical processes, including ones involving repository components such as spent fuel. The first of the two (BSC, 2007a) was for systems containing dilute aqueous solutions only, the other (BSC, 2007b) for systems involving concentrated aqueous solutions and incorporating a model for such based on Pitzer's (1991) equations. A 25 C-only database with similarities to the latter was also developed for the Waste Isolation Pilot Plant (WIPP, cf. Xiong, 2005). The NAGRA/PSI database (Hummel et al., 2002) was developed to support repository studies in Europe. The YMP databases are often used in non-repository studies, including studies of geothermal systems (e.g., Wolery and Carroll, 2010) and CO2 sequestration (e.g., Aines et al., 2011).

  1. Evaluation of spatial database management systems: A performance-based comparison 

    E-Print Network [OSTI]

    Arbesser-Rastburg, Thomas

    2009-11-26

    This analytical research paper investigates the question which of three Spatial Database Management Systems (Oracle 11g, PostgreSQL 8.3 with PostGIS 1.2 and MySQL 5) installed on a Linux platform performs best in queries ...

  2. LabFlow1: a Database Benchmark for HighThroughput Workflow Management ?

    E-Print Network [OSTI]

    Bonner, Anthony

    work­ flow management systems (WFMS). An important component of many WFMSs is a DBMS for keeping track of workflow activity. This DBMS maintains an audit trail, or event history, that records the results of each evolving business environment. Since the database schema depends on the work­ flow, the DBMS must also

  3. Managing Contention and Timing Constraints in a RealTime Database System \\Lambda

    E-Print Network [OSTI]

    Son, Sang H.

    22903, USA Abstract Previous work in real­time database management systems (RT­DBMS) has primarily based an actual RT­ DBMS on a real­time microkernel operating system. A real RT­DBMS must confront many practical of con­ structing a RT­DBMS is divided into three basic prob­ lems: dealing with resource contention

  4. LabFlow1: a Database Benchmark for HighThroughput Workflow Management \\Lambda

    E-Print Network [OSTI]

    Bonner, Anthony

    called workflow management systems (WFMS). An important component of many WFMSs is a DBMS for keeping track of workflow activity. This DBMS maintains an audit trail, or event history, that records a rapidly evolving business environment. Since the database schema depends on the workflow, the DBMS must

  5. Database Management Systems 3ed, R. Ramakrishnan and J. Gehrke 1 The Relational Model

    E-Print Network [OSTI]

    Tsotras, Vassilis J.

    intuitively, and the DBMS is responsible for efficient evaluation. ˇ The key: precise semantics for relational Carnatic101 C 53831 Reggae203 B 53650 Topology112 A 53666 History105 B Given the following instance of Enrolled (is this possible if the DBMS ensures referential integrity?): we get: Database Management Systems

  6. Comprehensive online Atomic Database Management System (DBMS) with Highly Qualified Computing Capabilities

    E-Print Network [OSTI]

    Tahat, Amani

    2011-01-01

    The intensive need of atomic data is expanding continuously in a wide variety of applications (e.g. fusion energy and astrophysics, laser-produced, plasma researches, and plasma processing).This paper will introduce our ongoing research work to build a comprehensive, complete, up-to-date, user friendly and online atomic Database Management System (DBMS) namely called AIMS by using SQLite (http://www.sqlite.org/about.html)(8). Programming language tools and techniques will not be covered here. The system allows the generation of various atomic data based on professional online atomic calculators. The ongoing work is a step forward to bring detailed atomic model accessible to a wide community of laboratory and astrophysical plasma diagnostics. AIMS is a professional worldwide tool for supporting several educational purposes and can be considered as a complementary database of IAEA atomic databases. Moreover, it will be an exceptional strategy of incorporating the output data of several atomic codes to external ...

  7. Cost of Ensuring Safety in Distributed Database Management Systems Maitrayi Sabaratnam, Maitrayi.Sabaratnam@idi.ntnu.no

    E-Print Network [OSTI]

    Database Manage- ment Systems (DBMS) require that the integrity of the data stored in the database. The evaluation is performed on a replicated DBMS, ClustRa [9]. The results show that the checksum overhead in a DBMS inflicted with a very high TPC-B-like workload caused a reduction in throughput up to 5

  8. Federated Web-accessible Clinical Data Management within an Extensible NeuroImaging Database

    E-Print Network [OSTI]

    2010-01-01

    Achieving evolvable web-database bioscience applicationsThe Human Clinical Imaging Database (HID) and Toolkit.The database schema is constructed to support the storage of

  9. Method and system for normalizing biometric variations to authenticate users from a public database and that ensures individual biometric data privacy

    DOE Patents [OSTI]

    Strait, Robert S. (Oakland, CA); Pearson, Peter K. (Livermore, CA); Sengupta, Sailes K. (Livermore, CA)

    2000-01-01

    A password system comprises a set of codewords spaced apart from one another by a Hamming distance (HD) that exceeds twice the variability that can be projected for a series of biometric measurements for a particular individual and that is less than the HD that can be encountered between two individuals. To enroll an individual, a biometric measurement is taken and exclusive-ORed with a random codeword to produce a "reference value." To verify the individual later, a biometric measurement is taken and exclusive-ORed with the reference value to reproduce the original random codeword or its approximation. If the reproduced value is not a codeword, the nearest codeword to it is found, and the bits that were corrected to produce the codeword to it is found, and the bits that were corrected to produce the codeword are also toggled in the biometric measurement taken and the codeword generated during enrollment. The correction scheme can be implemented by any conventional error correction code such as Reed-Muller code R(m,n). In the implementation using a hand geometry device an R(2,5) code has been used in this invention. Such codeword and biometric measurement can then be used to see if the individual is an authorized user. Conventional Diffie-Hellman public key encryption schemes and hashing procedures can then be used to secure the communications lines carrying the biometric information and to secure the database of authorized users.

  10. Object-Oriented Database for Managing Building Modeling Components and Metadata: Preprint

    SciTech Connect (OSTI)

    Long, N.; Fleming, K.; Brackney, L.

    2011-12-01

    Building simulation enables users to explore and evaluate multiple building designs. When tools for optimization, parametrics, and uncertainty analysis are combined with analysis engines, the sheer number of discrete simulation datasets makes it difficult to keep track of the inputs. The integrity of the input data is critical to designers, engineers, and researchers for code compliance, validation, and building commissioning long after the simulations are finished. This paper discusses an application that stores inputs needed for building energy modeling in a searchable, indexable, flexible, and scalable database to help address the problem of managing simulation input data.

  11. Authentication of byte sequences

    SciTech Connect (OSTI)

    Stearns, S.D.

    1991-06-01

    Algorithms for the authentication of byte sequences are described. The algorithms are designed to authenticate data in the Storage, Retrieval, Analysis, and Display (SRAD) Test Data Archive of the Radiation Effects and Testing Directorate (9100) at Sandia National Laboratories, and may be used in similar situations where authentication of stored data is required. The algorithms use a well-known error detection method called the Cyclic Redundancy Check (CRC). When a byte sequence is authenticated and stored, CRC bytes are generated and attached to the end of the sequence. When the authenticated data is retrieved, the authentication check consists of processing the entire sequence, including the CRC bytes, and checking for a remainder of zero. The error detection properties of the CRC are extensive and result in a reliable authentication of SRAD data.

  12. Multi-factor authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-10-21

    Detection and deterrence of spoofing of user authentication may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a user of the hardware device. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a PUF value. Combining logic is coupled to receive the PUF value, combines the PUF value with one or more other authentication factors to generate a multi-factor authentication value. A key generator is coupled to generate a private key and a public key based on the multi-factor authentication value while a decryptor is coupled to receive an authentication challenge posed to the hardware device and encrypted with the public key and coupled to output a response to the authentication challenge decrypted with the private key.

  13. Information flow in the DAMA Project beyond database managers: Information flow managers

    SciTech Connect (OSTI)

    Russell, L.; Wolfson, O.; Yu, C.

    1996-03-01

    To meet the demands of commercial data traffic on the information highway, a new look at managing data is necessary. One projected activity, sharing of point-of-sale information, is being considered in the Demand Activated Manufacturing Project of the American Textile Partnership project. A scenario is examined in which 100,000 retail outlets communicate over a period of days. They provide the latest estimate of demand for sewn products across a chain of 26,000 suppliers through the use of bill-of-materials explosions at four levels of detail. A new paradign the information flow manager, is developed to handle this situation, including the case where members of the supply chain fail to communicate and go out of business. Techniques for approximation are introduced to keep estimates of demand as current as possible.

  14. Hazardous waste database: Waste management policy implications for the US Department of Energy`s Environmental Restoration and Waste Management Programmatic Environmental Impact Statement

    SciTech Connect (OSTI)

    Lazaro, M.A.; Policastro, A.J.; Antonopoulos, A.A.; Hartmann, H.M.; Koebnick, B.; Dovel, M. [Argonne National Lab., IL (United States); Stoll, P.W. [COMPASS Environmental Compliance Associates, Boise, ID (United States)

    1994-03-01

    The hazardous waste risk assessment modeling (HaWRAM) database is being developed to analyze the risk from treatment technology operations and potential transportation accidents associated with the hazardous waste management alternatives. These alternatives are being assessed in the Department of Energy`s Environmental Restoration and Waste Management Programmatic Environmental Impact Statement (EM PEIS). To support the risk analysis, the current database contains complexwide detailed information on hazardous waste shipments from 45 Department of Energy installations during FY 1992. The database is currently being supplemented with newly acquired data. This enhancement will improve database information on operational hazardous waste generation rates, and the level and type of current on-site treatment at Department of Energy installations.

  15. Karlsruhe Database for Radioactive Wastes (KADABRA) - Accounting and Management System for Radioactive Waste Treatment - 12275

    SciTech Connect (OSTI)

    Himmerkus, Felix; Rittmeyer, Cornelia [WAK Rueckbau- und Entsorgungs- GmbH, 76339 Eggenstein-Leopoldshafen (Germany)

    2012-07-01

    The data management system KADABRA was designed according to the purposes of the Cen-tral Decontamination Department (HDB) of the Wiederaufarbeitungsanlage Karlsruhe Rueckbau- und Entsorgungs-GmbH (WAK GmbH), which is specialized in the treatment and conditioning of radioactive waste. The layout considers the major treatment processes of the HDB as well as regulatory and legal requirements. KADABRA is designed as an SAG ADABAS application on IBM system Z mainframe. The main function of the system is the data management of all processes related to treatment, transfer and storage of radioactive material within HDB. KADABRA records the relevant data concerning radioactive residues, interim products and waste products as well as the production parameters relevant for final disposal. Analytical data from the laboratory and non destructive assay systems, that describe the chemical and radiological properties of residues, production batches, interim products as well as final waste products, can be linked to the respective dataset for documentation and declaration. The system enables the operator to trace the radioactive material through processing and storage. Information on the actual sta-tus of the material as well as radiological data and storage position can be gained immediately on request. A variety of programs accessed to the database allow the generation of individual reports on periodic or special request. KADABRA offers a high security standard and is constantly adapted to the recent requirements of the organization. (authors)

  16. A Two-stage Stochastic View Selection Problem in Database Management Systems

    E-Print Network [OSTI]

    Young, R. Michael

    as Sears, Kmart, Target, and WalMart in the USA) all maintain significant- size databases storing information about ongoing sales transactions. For instance, WalMart is known for maintaining database

  17. Introduction to Database Database Systems Lecture 1

    E-Print Network [OSTI]

    Alechina, Natasha

    .cs.nott.ac.uk/~nza/G51DBS #12;In this Lecture · Course Information · Databases and Database Systems · Some History bookings · Credit card details · Student records · Customer histories · Stock market prices · Discussion of information · A database management system (DBMS) is the software than controls that information · Examples

  18. Inteum is the database used by CURF to manage the technology transfer process, i.e. confidential invention disclosures, patents, licenses, etc.

    E-Print Network [OSTI]

    Stuart, Steven J.

    Inteum is the database used by CURF to manage the technology transfer process, i.e. confidential to the disclosure. The enhanced capability of Inventor Portal will greatly assist in CURF's technology evaluation

  19. CSC 4480: Principles of Database Systems

    E-Print Network [OSTI]

    and technologies underlying database management systems. · Understand data models, physical data organization, data database · Database Management System (DBMS): generic program to manage databases 13 Basic Terms · Data decisions based on large volume of facts 15 Figure 1-1b Summarized data Useful information that managers can

  20. COMPILATION AND MANAGEMENT OF ORP GLASS FORMULATION DATABASE, VSL-12R2470-1 REV 0

    SciTech Connect (OSTI)

    Kruger, Albert A. [Department of Energy, Office of River Protection, Richland, Washington (United States); Pasieka, Holly K. [The Catholic University of America, Washington, DC (United States); Muller, Isabelle [The Catholic University of America, Washington, DC (United States); Gilbo, Konstantin [The Catholic University of America, Washington, DC (United States); Perez-Cardenas, Fernando [The Catholic University of America, Washington, DC (United States); Joseph, Innocent [The Catholic University of America, Washington, DC (United States); Pegg, Ian L. [The Catholic University of America, Washington, DC (United States); Kot, Wing K. [The Catholic University of America, Washington, DC (United States)

    2012-12-13

    The present report describes the first steps in the development of a glass property-composition database for WTP LAW and HL W glasses that includes all of the data that were used in the development of the WTP baseline models and all of the data collected subsequently as part of WTP enhancement studies perfonned for ORP. The data were reviewed to identifY some of the more significant gaps in the composition space that will need to be filled to support waste processing at Hanford. The WTP baseline models have been evaluated against the new data in terms of range of validity and prediction perfonnance.

  1. Entity Authentication and Authenticated Key Exchange with Tree Parity Machines

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    synchronization of two in­ teracting identically structured Tree Parity Machines (TPMs) has been proposed underEntity Authentication and Authenticated Key Exchange with Tree Parity Machines Markus Volkmer key exchange in the framework of Tree Parity Machines (TPMs). The interaction of TPMs has been

  2. A Streamlined, Cost-Effective Database Approach to Manage Requirements Traceability

    E-Print Network [OSTI]

    Kannenberg, Andrew

    2008-01-01

    component of many standards for software development such as the CMMI and ISO 9001:2000 for software development. Important benefits from traceability can be 13 realized in the following areas: project management, process visibility, verification... component of many standards for software development such as the CMMI and ISO 9001:2000 for software development. Important benefits from traceability can be 13 realized in the following areas: project management, process visibility, verification...

  3. A Survey of Schema Evolution in Object-Oriented Databases School of Information Systems, Technology and Management

    E-Print Network [OSTI]

    Madiraju, Praveen

    A Survey of Schema Evolution in Object-Oriented Databases Xue Li School of Information Systems in the schema evolution of object- oriented databases. The main issues in the current research are identified. 1. Changes in the real world can be reflected as the evolution of object- oriented databases. Database

  4. Management Of Schema Evolution In Databases JosC Andany Michel LConard Carole Palisser

    E-Print Network [OSTI]

    Madiraju, Praveen

    fields of DataBaseManagementSystems(DBMS) such asComputer Aided Design (CAD). It is an important a synthesis of projects basedon the version problem in softwareengineeringandin CAD. In the DBMS field for the Farandole 2 DBMS [Estier,89], [Falquet,89]. This systemis based on a datasemanticsmodel closeto the extended

  5. AN OBJECT-ORIENTED SGML/HYTIME COMPLIANT MULTIMEDIA DATABASE MANAGEMENT SYSTEM*

    E-Print Network [OSTI]

    Szafron, Duane

    management system (DBMS) technology. Mostly they have used DBMSs to store meta-information and have stored of a large amount of data. The development of multimedia computing systems can benefit from traditional DBMS-information in some DBMS. Finally, the size and complexity of multimedia objects require special treatment in storage

  6. Attributes of the Federal Energy Management Program's Federal Site Building Characteristics Database

    SciTech Connect (OSTI)

    Loper, Susan A.; Sandusky, William F.

    2010-12-31

    Typically, the Federal building stock is referred to as a group of about one-half million buildings throughout the United States. Additional information beyond this level is generally limited to distribution of that total by agency and maybe distribution of the total by state. However, additional characterization of the Federal building stock is required as the Federal sector seeks ways to implement efficiency projects to reduce energy and water use intensity as mandated by legislation and Executive Order. Using a Federal facility database that was assembled for use in a geographic information system tool, additional characterization of the Federal building stock is provided including information regarding the geographical distribution of sites, building counts and percentage of total by agency, distribution of sites and building totals by agency, distribution of building count and floor space by Federal building type classification by agency, and rank ordering of sites, buildings, and floor space by state. A case study is provided regarding how the building stock has changed for the Department of Energy from 2000 through 2008.

  7. Data Entry Procedures for Essig Web Data Portal The Essig Database can be used to manage collection records and track individual specimens. All specimen

    E-Print Network [OSTI]

    Data Entry Procedures for Essig Web Data Portal ~1~ The Essig Database can be used to manage specimens (eg. EMEC 12345) should be attached to the specimen at the time of data entry (or before. Finally, if latitude and longitude information is provided during data entry, specimen records can

  8. Hardware Security for Device Authentication in the Smart Grid

    E-Print Network [OSTI]

    Murawski, Andrzej

    Hardware Security for Device Authentication in the Smart Grid Andrew J. Paverd and Andrew P. Martin. Secure communication between devices is a key aspect of smart grid security. In the future smart home environment, various smart devices, appliances and energy management systems will communicate with each other

  9. Cryptanalysis of Two Dynamic IDbased Remote User Authentication Schemes for

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    University, Harbin City 150001, China 2 Automobile Management Institute of PLA, Bengbu City 233011, China guessing attack under their non­tamper resistance assumption of the smart card; (2) It fails to provide of schemes. Keywords: Cryptanalysis, Authentication protocol, O#ine password guessing attack, Smart card

  10. March 23, 2008 Databases: Intro. to DBs 1 Introduction to Databases

    E-Print Network [OSTI]

    Adam, Salah

    + Characteristics of database approach + Database Management System (DBMS) + Advantages of Using DBMS + Workers Involved in DBMSs + When Not to Use A DBMS + #12;March 23, 2008 Databases: Intro. to DBs 3 - Data Data Application programsUser 2 #12;March 23, 2008 Databases: Intro. to DBs 6 -- Database Approach Database DBMS

  11. Copyright Y. Daniel Liang, 2005 Database Concept and Design

    E-Print Network [OSTI]

    Liang, Y. Daniel

    to interact with the database system, as shown in Figure 1.1. Database Management System (DBMS) Application Programs System Users Application Users database Figure 1.1 A database system consists of data, DBMS. The software that stores and manages data is known as database management system, or DBMS. DBMS is usually

  12. 09-Databases-Wahid.pptx

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Wahid Bhimji (wbhimji@lbl.gov) https:www.nersc.govusersdata- analyticsdata-management Databases and IO --- 1 --- Systems Services Tools Capabilities Transfer Processing...

  13. NISTIR 7863 Cardholder Authentication for the

    E-Print Network [OSTI]

    NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk Hildegard.IR.7863 #12;NISTIR 7863 Cardholder Authentication for the PIV Digital Signature Key W. Timothy Polk

  14. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Concepts - 5th Edition, May 23, 2005 Database Management System (DBMS) DBMS contains information about

  15. Obfuscated authentication systems, devices, and methods

    DOE Patents [OSTI]

    Armstrong, Robert C; Hutchinson, Robert L

    2013-10-22

    Embodiments of the present invention are directed toward authentication systems, devices, and methods. Obfuscated executable instructions may encode an authentication procedure and protect an authentication key. The obfuscated executable instructions may require communication with a remote certifying authority for operation. In this manner, security may be controlled by the certifying authority without regard to the security of the electronic device running the obfuscated executable instructions.

  16. Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications

    E-Print Network [OSTI]

    Sabatini, David M.

    Nemesis: Preventing Authentication & Access Control Vulnerabilities in Web Applications Michael web applications. Authentication attacks occur when a web application authenticates users unsafely, granting access to web clients that lack the ap- propriate credentials. Access control attacks occur when

  17. SU-E-J-129: A Strategy to Consolidate the Image Database of a VERO Unit Into a Radiotherapy Management System

    SciTech Connect (OSTI)

    Yan, Y; Medin, P; Yordy, J; Zhao, B; Jiang, S

    2014-06-01

    Purpose: To present a strategy to integrate the imaging database of a VERO unit with a treatment management system (TMS) to improve clinical workflow and consolidate image data to facilitate clinical quality control and documentation. Methods: A VERO unit is equipped with both kV and MV imaging capabilities for IGRT treatments. It has its own imaging database behind a firewall. It has been a challenge to transfer images on this unit to a TMS in a radiation therapy clinic so that registered images can be reviewed remotely with an approval or rejection record. In this study, a software system, iPump-VERO, was developed to connect VERO and a TMS in our clinic. The patient database folder on the VERO unit was mapped to a read-only folder on a file server outside VERO firewall. The application runs on a regular computer with the read access to the patient database folder. It finds the latest registered images and fuses them in one of six predefined patterns before sends them via DICOM connection to the TMS. The residual image registration errors will be overlaid on the fused image to facilitate image review. Results: The fused images of either registered kV planar images or CBCT images are fully DICOM compatible. A sentinel module is built to sense new registered images with negligible computing resources from the VERO ExacTrac imaging computer. It takes a few seconds to fuse registered images and send them to the TMS. The whole process is automated without any human intervention. Conclusion: Transferring images in DICOM connection is the easiest way to consolidate images of various sources in your TMS. Technically the attending does not have to go to the VERO treatment console to review image registration prior delivery. It is a useful tool for a busy clinic with a VERO unit.

  18. CERTIFICATE OF AUTHENTICITY | Department of Energy

    Energy Savers [EERE]

    D.C. Tran001.pdf PDF icon CERTIFICATE OF AUTHENTICITY More Documents & Publications U.S. Offshore Wind Advanced Technology Demonstration Projects Public Meeting Transcript for...

  19. Database and Analytical Tool Development for the Management of Data Derived from US DOE (NETL) Funded Fine Particulate (PM2.5) Research

    SciTech Connect (OSTI)

    Robinson P. Khosah; Frank T. Alex

    2007-02-11

    Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-eighth month of development activities.

  20. DATABASE AND ANALYTICAL TOOL DEVELOPMENT FOR THE MANAGEMENT OF DATA DERIVED FROM US DOE (NETL) FUNDED FINE PARTICULATE (PM 2.5) RESEARCH

    SciTech Connect (OSTI)

    Robinson P. Khosah; Charles G. Crawford

    2006-02-11

    Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its forty-second month of development activities.

  1. Database and Analytical Tool Development for the Management of Data Derived from US DOE (NETL) Funded Fine Particulate (PM2.5) Research

    SciTech Connect (OSTI)

    Robinson Khosah

    2007-07-31

    Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project was conducted in two phases. Phase One included the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two involved the development of a platform for on-line data analysis. Phase Two included the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now technically completed.

  2. DATABASE AND ANALYTICAL TOOL DEVELOPMENT FOR THE MANAGEMENT OF DATA DERIVED FROM US DOE (NETL) FUNDED FINE PARTICULATE (PM2.5) RESEARCH

    SciTech Connect (OSTI)

    Robinson P. Khosah; Charles G. Crawford

    2005-02-01

    Advanced Technology Systems, Inc. (ATS) was contracted by the U. S. Department of Energy's National Energy Technology Laboratory (DOE-NETL) to develop a state-of-the-art, scalable and robust web-accessible database application to manage the extensive data sets resulting from the DOE-NETL-sponsored ambient air monitoring programs in the upper Ohio River valley region. The data management system was designed to include a web-based user interface that will allow easy access to the data by the scientific community, policy- and decision-makers, and other interested stakeholders, while providing detailed information on sampling, analytical and quality control parameters. In addition, the system will provide graphical analytical tools for displaying, analyzing and interpreting the air quality data. The system will also provide multiple report generation capabilities and easy-to-understand visualization formats that can be utilized by the media and public outreach/educational institutions. The project is being conducted in two phases. Phase One includes the following tasks: (1) data inventory/benchmarking, including the establishment of an external stakeholder group; (2) development of a data management system; (3) population of the database; (4) development of a web-based data retrieval system, and (5) establishment of an internal quality assurance/quality control system on data management. Phase Two, which is currently underway, involves the development of a platform for on-line data analysis. Phase Two includes the following tasks: (1) development of a sponsor and stakeholder/user website with extensive online analytical tools; (2) development of a public website; (3) incorporation of an extensive online help system into each website; and (4) incorporation of a graphical representation (mapping) system into each website. The project is now into its thirtieth month of development activities.

  3. Instructions for using HSPD-12 Authenticated Outlook Web Access...

    Energy Savers [EERE]

    Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Instructions for using HSPD-12 Authenticated Outlook Web Access (OWA) Provides instructions for remote Outlook...

  4. Development of an OCS Cementing Operational Guidelines Database 

    E-Print Network [OSTI]

    Bell, Matthew G.

    2014-08-20

    the goals of the database, identifying its users, and selecting an appropriate database management system. The main goal of the database is to present specific design, testing, and operational procedures to ensure optimized cement seal effectiveness...

  5. Verifying authentication protocols with CSP Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    Verifying authentication protocols with CSP Steve Schneider Department of Computer Science Royal of Communicating Sequential Processes (CSP). It is il- lustrated by an examination of the Needham-Schroeder public of authentication protocols, built on top of the gen- eral CSP semantic framework. This approach aims to combine

  6. Artemis Chado database -practical guide Annotation in the database version of Artemis

    E-Print Network [OSTI]

    Maizels, Rick

    -1- Artemis Chado database - practical guide Annotation in the database version of Artemis 1 directory for the backup files and optionally save this setting between sessions. Wait for the `Database and File Manager' to be loaded. Click on `Launch Artemis'. #12;-2- Artemis Chado database - practical guide

  7. REGULAR ENTRY IN ENCYCLOPEDIA OF DATABASE SYSTEMS

    E-Print Network [OSTI]

    Risch, Tore

    network. In a central DBMS the data is managed by one node whereas in a distributed DBMS the data is managed by several nodes. A distributed DBMS is a database manager consisting of several nodes distributed in the network. In a regular distributed DBMS it is up to the database administrator to manually specify how data

  8. Appears in Proceedings Eighth International Conference on Statistical and Scientific Database Management, Stockholm, Sweden, June 18-20, 1996

    E-Print Network [OSTI]

    Kerschberg, Larry

    . The information holdings are organized into the source data archives, a data warehouse which provides the atmosphere, land, and ocean. An estimated one terabyte of raw data will be sent to the Earth every day Management, Stockholm, Sweden, June 18-20, 1996 Data and Information Architectures for Large

  9. Specification and Management of QoS in Imprecise Real-Time Databases Mehdi Amirijoo, Jrgen Hansson

    E-Print Network [OSTI]

    QoS requirements in terms of data and transac- tion preciseness, an architecture based on feedback, to high-level management and business data. In these applications it is desirable to process user requests within their deadlines using fresh data. In systems, such as web- servers and sensor networks with non

  10. AUTHENTICATED

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 OutreachProductswsicloudwsicloudden Documentation DataStreamsTotalproposals duenationalMeetingFAQs05-2010

  11. V-223: RSA Authentication Agent for PAM Allows Remote Users to...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability V-103: RSA Authentication Agent Lets Remote Users Bypass...

  12. U-267: RSA® Authentication Agent 7.1 for Microsoft Windows®...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability PLATFORM: Product: RSA Authentication Agent for Microsoft...

  13. `Modern' Databases Database Systems Lecture 18

    E-Print Network [OSTI]

    Alechina, Natasha

    `Modern' Databases Database Systems Lecture 18 Natasha Alechina #12;'Modern' Databases In This Lecture · 'Modern' Databases · Distributed DBs · Web-based DBs · Object Oriented DBs · Semistructured Data chapter 4 #12;'Modern' Databases Other Sorts of DB · We have looked mainly at relational databases

  14. `Modern' Databases Database Systems Lecture 18

    E-Print Network [OSTI]

    Alechina, Natasha

    1 `Modern' Databases Database Systems Lecture 18 Natasha Alechina 'Modern' Databases In This Lecture · 'Modern' Databases · Distributed DBs · Web-based DBs · Object Oriented DBs · Semistructured Data chapter 4 'Modern' Databases Other Sorts of DB · We have looked mainly at relational databases

  15. Hardware device binding and mutual authentication

    DOE Patents [OSTI]

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  16. Database Help

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would like submit theCovalent Bonding Low-Cost2 DOE HQSiteoC. DoranDatabase Help Database Help

  17. Interception and modification of network authentication packets with the purpose of allowing alternative authentication modes

    DOE Patents [OSTI]

    Kent, Alexander Dale (Los Alamos, NM)

    2008-09-02

    Methods and systems in a data/computer network for authenticating identifying data transmitted from a client to a server through use of a gateway interface system which are communicately coupled to each other are disclosed. An authentication packet transmitted from a client to a server of the data network is intercepted by the interface, wherein the authentication packet is encrypted with a one-time password for transmission from the client to the server. The one-time password associated with the authentication packet can be verified utilizing a one-time password token system. The authentication packet can then be modified for acceptance by the server, wherein the response packet generated by the server is thereafter intercepted, verified and modified for transmission back to the client in a similar but reverse process.

  18. Task 1.13 - Data Collection and Database Development for Clean Coal Technology By-Product Characteristics and Management Practices

    SciTech Connect (OSTI)

    Debra F. Pflughoeft-Hassett

    1998-02-01

    U.S. Department of Energy Federal Energy Technology Center-Morgantown (DOE FETC) efforts in the areas of fossil fuels and clean coal technology (CCT) have included involvement with both conventional and advanced process coal conversion by-products. In 1993, DOE submitted a Report to Congress on "Barriers to the Increased Utilization of Coal Combustion Desulfurization Byproducts by Governmental and Commercial Sectors" that provided an outline of activities to remove the barriers identified in the report. DOE charged itself with participation in this process, and the work proposed in this document facilitates DOE's response to its own recommendations for action. The work reflects DOE's commitment to the coal combustion by-product (CCB) industry, to the advancement of clean coal technology, and to cooperation with other government agencies. Information from DOE projects and commercial endeavors in fluidized-bed combustion (FBC) and coal gasification is the focus of this task. The primary goal is to provide an easily accessible compilation of characterization information on the by-products from these processes to government agencies and industry to facilitate sound regulatory and management decisions. Additional written documentation will facilitate the preparation of an updated final version of background information collected for DOE in preparation of the Report to Congress on barriers to CCB utilization.

  19. V-103: RSA Authentication Agent Lets Remote Users Bypass Authenticatio...

    Broader source: Energy.gov (indexed) [DOE]

    Authentication Agent 7.1 for Microsoft Windows and RSA Authentication Client 3.5 Access Control Vulnerability T-704: RSA enVision Lets Remote Users View Files and Remote...

  20. CLOC: Authenticated Encryption for Short Input Tetsu Iwata1

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    . CLOC uses a variant of CFB mode in its encryption part and a variant of CBC MAC in the authentication

  1. Database, Spatial Spatial databases are the foundation for computer-based applications involving spatially

    E-Print Network [OSTI]

    managed using a particular type of software called a database management system (DBMS) that allows be implemented in a GIS, in a computer-assisted design (CAD) system coupled with a DBMS, in a universal server

  2. Evaluation of Functional Data Models for Database Design and Use 

    E-Print Network [OSTI]

    Kulkarni, Krishnarao Gururao

    1983-01-01

    The problems of design, operation, and maintenance of databases using the three most popular database management systems (Hierarchical, CQDASYL/DBTG, and Relational) are well known. Users wishing to use these systems ...

  3. March 23, 2008 Databases: Information Systems 1 Information Systems

    E-Print Network [OSTI]

    Adam, Salah

    March 23, 2008 Databases: Information Systems 1 Information Systems #12;March 23, 2008 Databases: Information Systems 2 Objectives What is an Information System (IS) + Classification of Information Systems + Evolution of Information Systems + Information System Management + Performance Requirements of ISs + #12

  4. Site Sustainability Plan An Authentic Commitment

    E-Print Network [OSTI]

    #12;#12;Contents Site Sustainability Plan An Authentic Commitment Contents Acronyms and Abbreviations iv Executive Summary v Greenhouse Gas 1 Energy 6 High Performance Sustainable Buildings 9 Fleet 11 Water 13 Pollution Prevention 15 Sustainable Acquisition 19 Electronic Stewardship and Data Centers 20

  5. Massachusetts Institute of Technology Identification and Authentication

    E-Print Network [OSTI]

    Circuits Blaise Gassend, Dwaine Clarke, Daihyun Lim, Marten van Dijk, Srini Devadas To appear and Authentication of Integrated Circuits Blaise Gassend1, Dwaine Clarke1, Daihyun Lim1 Marten van Dijk2, Srinivas. VAN DIJK, S. DEVADAS However, with these techniques, the focus is simply on assigning a unique

  6. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure -- against a passive adversary -- a variant of the two-round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  7. Scalable Protocols for Authenticated Group Key Exchange

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    a passive eavesdropper to an authenticated protocol which is secure against an active adversary who controls) to the original scheme. We then prove secure --- against a passive adversary --- a variant of the two­round group. The recent foundational papers of Bresson, et al. [16, 14, 15] (building on [9, 10, 7]) were the first

  8. Lightweight Message Authentication for the Internet of

    E-Print Network [OSTI]

    Maguire Jr., Gerald Q.

    Lightweight Message Authentication for the Internet of Things RIKARD HÖGLUND KTH ROYAL INSTITUTE for the Internet of Things Rikard Höglund 2014-11-24 Master's Thesis Examiner and academic adviser Professor Gerald capable of connecting to the Internet has grown enormously. The Internet of Things describes a scenario

  9. Nuclear Concrete Materials Database Phase I Development

    SciTech Connect (OSTI)

    Ren, Weiju; Naus, Dan J

    2012-05-01

    The FY 2011 accomplishments in Phase I development of the Nuclear Concrete Materials Database to support the Light Water Reactor Sustainability Program are summarized. The database has been developed using the ORNL materials database infrastructure established for the Gen IV Materials Handbook to achieve cost reduction and development efficiency. In this Phase I development, the database has been successfully designed and constructed to manage documents in the Portable Document Format generated from the Structural Materials Handbook that contains nuclear concrete materials data and related information. The completion of the Phase I database has established a solid foundation for Phase II development, in which a digital database will be designed and constructed to manage nuclear concrete materials data in various digitized formats to facilitate electronic and mathematical processing for analysis, modeling, and design applications.

  10. Session title: Distributed and intelligent databases

    SciTech Connect (OSTI)

    Argos, P.; Mewes, H.W.; Frishman, D.

    1996-12-31

    This session focuses on the recent advances in the delivery of information to the biological community concerning genome sequencing and related information. New approaches include interconnecting existing databases, knowledge-based expert systems, interface languages and multiserver management.

  11. NUCLEAR STRUCTURE DATABASE

    E-Print Network [OSTI]

    Firestone, R.B.

    2010-01-01

    CALIFORNIA NUCLEAR STRUCTURE DATABASE R. B. Firestone and E.11089 NUCLEAR STRUCTURE DATABASE by R.B. Firestone and E.iii- NUCLEAR STRUCTURE DATABASE R.B Firestone and E. Browne

  12. DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c

    E-Print Network [OSTI]

    Wiederhold, Gio

    To a Mouse, 1787 The previous chapter described models of databases. The structure of the database the database model, but do not make it directly available to a database management system. In this chapter we404 !le DATABASE DESIGN, Gio Wiederhold CHAPTER 8, file CHAP8.tex This file is c fl1977 by Mc

  13. Th D t b E i t dThe Database Environment and Developmentp

    E-Print Network [OSTI]

    Basic Definitions · Database (DB): collection of dataDatabase (DB): collection of data. · DBMS: generic program Management System (DBMS) 1212 #12;Database Management Systemg y Application A software system that is used to create, maintain, and provide controlled access to user databases Application #1 (Order Filing) DBMS

  14. Learning Outcomes for BSc in Engineering Management

    E-Print Network [OSTI]

    Karlsson, Brynjar

    , supply chain management and logistics, and lean manufacturing. Create a relational database schema in SQL

  15. T-646: Debian fex authentication bypass | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    of "auth-ID" when uploading files and can be exploited to bypass the authentication mechanism. PLATFORM: Debian fex ABSTRACT: Debian security discovered that fex, a web service...

  16. Modularization of the DADAISM Ada Database System Architecture

    E-Print Network [OSTI]

    Keller, Arthur M.

    implemen­ tation paradigm is necessary to handle the evolution of database systems over the next fewPage 1 Modularization of the DADAISM Ada Database System Architecture Arthur M. Keller Gio Wiederhold Stanford University Draft of May 21, 1991 Abstract. We describe a new database management system

  17. Modularization of the DADAISM Ada Database System Architecture

    E-Print Network [OSTI]

    Keller, Arthur M.

    implemen- tation paradigm is necessary to handle the evolution of database systems over the next fewPage 1 Modularization of the DADAISM Ada Database System Architecture Arthur M. Keller Gio Wiederhold Stanford University Draft of May 21, 1991 Abstract. We describe a new database management system

  18. Conceptual Modelling of Database Applications Using an Extended ER Model

    E-Print Network [OSTI]

    Gogolla, Martin - Fachbereich 3

    Conceptual Modelling of Database Applications Using an Extended ER Model Data and Knowledge is divided into the modelling of admissible database state evolutions by means of temporal integrity184/1) #12; H.2.1 [Database Management] Logical Design -- Data models; Schema and subschema. H.2

  19. An Optimal Strong Password Authentication Protocol with USB Sticks

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    transactions require a more stringent authentication process [11]. The use of digital certificates issued authentication mechanism has three class classifications are: the password-only PA protocols, the dedicated device-aided protocols and memory device-aided protocols. The Password-only PA protocol, has no extra

  20. IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS

    E-Print Network [OSTI]

    Qi, Xiaojun

    IMAGE AUTHENTICATION AND TAMPER DETECTION USING TWO COMPLEMENTARY WATERMARKS Xiaojun Qi, Xing Xin-fragile watermarking scheme for image authentication and tamper detection. The proposed scheme extracts content coefficients after incidental distortions. We also generate the content-based watermark to localize tampered

  1. Image Authentication and Tampering Localization using Distributed Source Coding

    E-Print Network [OSTI]

    Girod, Bernd

    Image Authentication and Tampering Localization using Distributed Source Coding Yao-Chung Lin the legitimate diversity of encoded images from tampering. An authentication decoder was supplied with a Slepian the decoder to localize tampering in an image already deemed to be inauthentic. The localization decoder

  2. Yet Another Ultralightweight Authentication Protocol that is Broken

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    broken. These protocols rely on very simple building blocks, such as bitwise operations (,, ), modular in this paper how a passive attack can recover the 96-bit secret of a tag, using only 20 authentication sessions. The attack requires a passive adversary to eavesdrop one authentication session where a property

  3. Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio

    E-Print Network [OSTI]

    Du, Wenliang "Kevin"

    Cryptographic Link Signatures for Spectrum Usage Authentication in Cognitive Radio Xi Tan, Kapil the usage of the spectrum to avoid interference with the primary user. However, achieving a trustworthy this attack, there should be a way to authenticate primary users' spectrum usage. We propose a method

  4. A Two-factor Authentication Mechanism Using Mobile Phones

    E-Print Network [OSTI]

    -03 Last Modification Date: 2008/08/20 Abstract Mobile devices are becoming more pervasive and more of mobile devices to provide a two-factor authentication method. Our approach uses a combination of one-time passwords, as the first authentication factor, and credentials stored on a mobile device, as the second

  5. Multi-Level TESLA: Broadcast Authentication for Distributed Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    Multi-Level µTESLA: Broadcast Authentication for Distributed Sensor Networks DONGGANG LIU and PENG named multi-level µTESLA based on µTESLA, a broadcast authentication protocol whose scalability is limited by its unicast-based initial parameter distribution. Multi-level µTESLA satisfies several nice

  6. Interactive visualization of big data leveraging databases for scalable computation

    E-Print Network [OSTI]

    Battle, Leilani Marie

    2013-01-01

    Modern database management systems (DBMS) have been designed to efficiently store, manage and perform computations on massive amounts of data. In contrast, many existing visualization systems do not scale seamlessly from ...

  7. Proceedings of the 2009 Industrial Engineering Research Conference Portable Equipment Management in Hospitals

    E-Print Network [OSTI]

    Rossetti, Manuel D.

    . Introduction Asset management is a critical part of a hospital's logistical operations. Large quantities categories: asset management, inventory management, authenticity management, identity management and process management [2]. The scope of this study falls into asset management, which involves tracking and managing

  8. Lessons Learned From Developing Reactor Pressure Vessel Steel Embrittlement Database

    SciTech Connect (OSTI)

    Wang, Jy-An John

    2010-08-01

    Materials behaviors caused by neutron irradiation under fission and/or fusion environments can be little understood without practical examination. Easily accessible material information system with large material database using effective computers is necessary for design of nuclear materials and analyses or simulations of the phenomena. The developed Embrittlement Data Base (EDB) at ORNL is this comprehensive collection of data. EDB database contains power reactor pressure vessel surveillance data, the material test reactor data, foreign reactor data (through bilateral agreements authorized by NRC), and the fracture toughness data. The lessons learned from building EDB program and the associated database management activity regarding Material Database Design Methodology, Architecture and the Embedded QA Protocol are described in this report. The development of IAEA International Database on Reactor Pressure Vessel Materials (IDRPVM) and the comparison of EDB database and IAEA IDRPVM database are provided in the report. The recommended database QA protocol and database infrastructure are also stated in the report.

  9. C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems Chain Authentication in Mobile Communication

    E-Print Network [OSTI]

    Shieh, Shiuhpyng Winston

    C. T. Lin, S. P. Shieh / Chain Authentication in Mobile Communication Systems 1 Chain Authentication in Mobile Communication Systems Chern-Tang Lin, Shiuh-Pyng Shieh Department of Computer Science systems have become a future trend in personal communications services (PCS) networks. To satisfy

  10. Pre-Authentication Filters: Providing DoS Resistance for Signature-Based Broadcast Authentication in Sensor

    E-Print Network [OSTI]

    Ning, Peng

    their battery power. This paper studies how to deal with such DoS attacks when signatures are used for broadcast types of solutions for broadcast authentication in sensor networks, µTESLA [19] and digital signature [5]. µTESLA and its variations achieve broad- cast authentication through delayed disclosure of authenti

  11. Improving Classical Authentication over a Quantum Channel F. M. Assis1

    E-Print Network [OSTI]

    Lisboa, Universidade Técnica de

    . Authentication tags allow to separate the secrecy Corresponding author. 1 #12;problem in message transmission

  12. The EMIME Bilingual Database 

    E-Print Network [OSTI]

    Wester, Mirjam

    2010-01-01

    This paper describes the collection of a bilingual database of Finnish/English and German/English data. In addition, the accents of the talkers in the database have been rated. English, German and Finnish listeners assessed the English, German...

  13. USER'S GUIDE DATABASE SYSTEM

    E-Print Network [OSTI]

    Budny, Robert

    USER'S GUIDE TO THE MINGL DATABASE SYSTEM FOR TFTR Version 4.1 R. M. Wieland Plasma Physics blank] #12;1 Abstract The MINGL database system is an integrated set of tools which is used to collect relational databases. A flexible software tool set makes it easy to browse, select, compare and display

  14. Database Encryption Luc Bouganim

    E-Print Network [OSTI]

    Database Encryption Luc Bouganim INRIA Rocquencourt Le Chesnay, FRANCE Luc.Bouganim@inria.fr Yanli GUO INRIA Rocquencourt Le Chesnay, FRANCE yanli.guo@inria.fr Related concepts and keywords Database security, Data confidentiality, Hardware Security Module Definition Database encryption refers to the use

  15. WOL: A Language for Database Transformations and Constraints * Susan B. Davidson

    E-Print Network [OSTI]

    Pennsylvania, University of

    in data management. These tasks are complicated by schema evolution in the underlying databases such as reimplementing legacy systems, adapting databases to schema evolution, integrating heterogeneous databasesWOL: A Language for Database Transformations and Constraints * Susan B. Davidson Dept. of Computer

  16. Integrated storage and querying of spatially varying data quality information in a relational spatial database

    E-Print Network [OSTI]

    Duckham, Matt

    spatial database M.G.S.M Zaffar Sadiq and Matt Duckham Department of Geomatics, University of Melbourne Variation in Quality Keywords Spatial data quality; spatial database; relational database management system for storing and retrieving spatially varying data quality information in a relational spatial database. Rather

  17. Database Description with SDM: A Semantic Database Model

    E-Print Network [OSTI]

    McLeod, Dennis

    Database Description with SDM: A Semantic Database Model MICHAEL HAMMER Massachusetts Institute of Technology and DENNIS McLEOD University of Southern California SDM is a high-level semantics-based database description and structuring formalism (database model) for databases. This database model is designed

  18. Database tool ASGARD: an open-access database of

    E-Print Network [OSTI]

    Alwes, Frederike

    Database tool ASGARD: an open-access database of annotated transcriptomes for emerging model database, the Assembled Searchable Giant Arthropod Read Database (ASGARD). This database is a repository include search term auto-completion sug- gestions based on database content, the ability to download

  19. Bridging the Gap in the Chemical Thermodynamic Database for Nuclear Waste Repository: Studies of the Effect of Temperature on Actinide Complexation

    E-Print Network [OSTI]

    Rao, Linfeng

    2011-01-01

    Thermodynamic Database for Nuclear Waste Repository: Studiesthermodynamic database for nuclear waste repository wherethe safe management of nuclear wastes is to store the high-

  20. What is a Database? A DBMS? !A very large, integrated collection of data

    E-Print Network [OSTI]

    What is a Database? A DBMS? !A very large, integrated collection of data !Models real Database Management System (DBMS) is a software package designed to store and manage databases CS174A ­ security ­ concurrency DBMS Functionalities queries updates concurrency integrity constraints CS174A

  1. Risk Management for Distributed Authorization Christian Skalka

    E-Print Network [OSTI]

    Wang, Xiaoyang "Sean"

    Risk Management for Distributed Authorization Christian Skalka University of Vermont X. Sean Wang assess risk, but risk in trust management is usually an informal consideration. In this paper, we de trust management systems treat all assertions as equally valid up to certificate authentication

  2. Secure password-based authenticated key exchange for web services

    SciTech Connect (OSTI)

    Liang, Fang; Meder, Samuel; Chevassut, Olivier; Siebenlist, Frank

    2004-11-22

    This paper discusses an implementation of an authenticated key-exchange method rendered on message primitives defined in the WS-Trust and WS-SecureConversation specifications. This IEEE-specified cryptographic method (AuthA) is proven-secure for password-based authentication and key exchange, while the WS-Trust and WS-Secure Conversation are emerging Web Services Security specifications that extend the WS-Security specification. A prototype of the presented protocol is integrated in the WSRF-compliant Globus Toolkit V4. Further hardening of the implementation is expected to result in a version that will be shipped with future Globus Toolkit releases. This could help to address the current unavailability of decent shared-secret-based authentication options in the Web Services and Grid world. Future work will be to integrate One-Time-Password (OTP) features in the authentication protocol.

  3. Does Future Social Exclusion have an Effect on State Authenticity

    E-Print Network [OSTI]

    Wilson, Craig Frank

    2010-06-30

    Previous research on social exclusion has found that it has many social and personal consequences, such as disrupting self-regulation, and lowering well-being, self-esteem and the need to belong. However, authenticity is ...

  4. Investigating the Effect of Social Exclusion on State Authenticity 

    E-Print Network [OSTI]

    Wilson, Poppy F

    2010-05-30

    This study examines the effect of social exclusion on state authenticity, the extent to which one feels real and true to the self in different situations. In addition to this, the effect of social exclusion on basic need ...

  5. Understanding 'It': Affective Authenticity, Space, and the Phish Scene

    E-Print Network [OSTI]

    Yeager, Elizabeth Anne

    2011-04-26

    "Understanding It: Affective Authenticity, Space, and the Phish Scene" is an ethnographic study of "scene identity" around the contemporary rock band Phish. Utilizing data generated from six years of ethnographic fieldwork, ...

  6. Authenticated writing assessments of agricultural education graduate students 

    E-Print Network [OSTI]

    Wright, Kimberly Dawn

    2004-11-15

    -1 AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to the Office of Graduate Studies of Texas A&M University in partial fulfillment of the requirements for the degree... of MASTER OF SCIENCE August 2004 Major Subject: Agricultural Education AUTHENTICATED WRITING ASSESSMENTS OF AGRICULTURAL EDUCATION GRADUATE STUDENTS A Thesis by KIMBERLY DAWN WRIGHT Submitted to Texas A...

  7. V-220: Juniper Security Threat Response Manager Lets Remote Authenticated

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The EconomicsVulnerabilities |VulnerabilitiesUsers Execute

  8. Analog Video Authentication and Seal Verification Equipment Development

    SciTech Connect (OSTI)

    Gregory Lancaster

    2012-09-01

    Under contract to the US Department of Energy in support of arms control treaty verification activities, the Savannah River National Laboratory in conjunction with the Pacific Northwest National Laboratory, the Idaho National Laboratory and Milagro Consulting, LLC developed equipment for use within a chain of custody regime. This paper discussed two specific devices, the Authentication Through the Lens (ATL) analog video authentication system and a photographic multi-seal reader. Both of these devices have been demonstrated in a field trial, and the experience gained throughout will also be discussed. Typically, cryptographic methods are used to prove the authenticity of digital images and video used in arms control chain of custody applications. However, in some applications analog cameras are used. Since cryptographic authentication methods will not work on analog video streams, a simple method of authenticating analog video was developed and tested. A photographic multi-seal reader was developed to image different types of visual unique identifiers for use in chain of custody and authentication activities. This seal reader is unique in its ability to image various types of seals including the Cobra Seal, Reflective Particle Tags, and adhesive seals. Flicker comparison is used to compare before and after images collected with the seal reader in order to detect tampering and verify the integrity of the seal.

  9. Active Social Media Management: The Case of Health Care

    E-Print Network [OSTI]

    Miller, Amalia R.

    Given the demand for authentic personal interactions over social media, it is unclear how much firms should actively manage their social media presence. We study this question empirically in a health care setting. We show ...

  10. 2010 Worldwide Gasification Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The 2010 Worldwide Gasification Database describes the current world gasification industry and identifies near-term planned capacity additions. The database lists gasification projects and includes information (e.g., plant location, number and type of gasifiers, syngas capacity, feedstock, and products). The database reveals that the worldwide gasification capacity has continued to grow for the past several decades and is now at 70,817 megawatts thermal (MWth) of syngas output at 144 operating plants with a total of 412 gasifiers.

  11. Schema Repository for Database Schema Evolution1 This work is carried out as part of IM2 ( Interactive Multimodal Information Management) (http://www.im2.ch), Swiss National Competence Centre

    E-Print Network [OSTI]

    Pottinger, Rachel

    Schema Repository for Database Schema Evolution1 1 This work is carried out as part of IM2 of database schemas. The repository is part of a multidisciplinary approach for schema evolution called the predictive approach for database evolution. The schema repository has a dual role in the approach: (1) during

  12. Databases of problems using LATEX Mark Hickman

    E-Print Network [OSTI]

    Hickman, Mark

    of Canterbury mark.hickman@canterbury.ac.nz Version 1.3 1 OVERVIEW This document describes the package problems. This package allows the management of a database of problems (with optional solutions) within LATEX equation is given by $$ \\pder[2]{u}{t^2} = c^2 \\, \\pder[2]{u}{x^2} \\label{wave} $$ where $c

  13. Smart Services for Ad Hoc Databases University of Washington

    E-Print Network [OSTI]

    Matrajt, Graciela

    data-base from lists of addresses of nearby schools, locations of resources (e.g., ambulances), and contact information for emergency workers. · A consulting business analyst assembles an ad hoc data- base of commercial database management systems are prohibitive, especially without access to dedicated IT staff

  14. management

    National Nuclear Security Administration (NNSA)

    5%2A en Management and Budget http:www.nnsa.energy.govaboutusouroperationsmanagementandbudget

  15. Towards G2G: Systems of Technology Database Systems

    E-Print Network [OSTI]

    Maluf, David A.

    the creation of an integrated approach to sustain effective management of technology investments that supports the ability of various technology database systems to be independently managed. The integration technology an integrated management of technology approach that serves the global needs of NASA. The G2G capabilities

  16. Efficient authentication scheme for data aggregation in smart grid with fault tolerance and fault diagnosis

    E-Print Network [OSTI]

    Li, Depeng

    Authentication schemes relying on per-packet signature and per-signature verification introduce heavy cost for computation and communication. Due to its constraint resources, smart grid's authentication requirement cannot ...

  17. U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    2: PostgreSQL Bugs Let Remote Authenticated Users Gain Elevated Privileges, Inject SQL Commands, and Spoof Certificates U-112: PostgreSQL Bugs Let Remote Authenticated Users Gain...

  18. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Hervâ??e SIBERT, Patrick DEHORNOY, and Marc, authentication, zero knowledge, handle reduction. 1 #12; 2 HERV â?? E SIBERT, PATRICK DEHORNOY, AND MARC GIRAULT 2

  19. Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding author)

    E-Print Network [OSTI]

    Doran, Simon J.

    1 Specifying authentication using signal events in CSP Siraj A. Shaikh (first and corresponding in the process algebra Communicating Sequential Processes (CSP) to specify authentication. The purpose, security protocols, CSP, formal specification, Kerberos 1. Introduction Schneider [1] uses Communicating

  20. Hazard Analysis Database Report

    SciTech Connect (OSTI)

    GAULT, G.W.

    1999-10-13

    The Hazard Analysis Database was developed in conjunction with the hazard analysis activities conducted in accordance with DOE-STD-3009-94, Preparation Guide for US Department of Energy Nonreactor Nuclear Facility Safety Analysis Reports, for the Tank Waste Remediation System (TWRS) Final Safety Analysis Report (FSAR). The FSAR is part of the approved TWRS Authorization Basis (AB). This document describes, identifies, and defines the contents and structure of the TWRS FSAR Hazard Analysis Database and documents the configuration control changes made to the database. The TWRS Hazard Analysis Database contains the collection of information generated during the initial hazard evaluations and the subsequent hazard and accident analysis activities. The database supports the preparation of Chapters 3,4, and 5 of the TWRS FSAR and the USQ process and consists of two major, interrelated data sets: (1) Hazard Evaluation Database--Data from the results of the hazard evaluations; and (2) Hazard Topography Database--Data from the system familiarization and hazard identification.

  1. Database Group, Georgia Tech Leo Mark 1DB Methodology

    E-Print Network [OSTI]

    Demurjian, Steven A.

    -)design · Analysis · Specification · Design · Implementation · Testing · Operation · Maintenance Management Database-term maintenance ­ few people; little turnover ­ no critical resources ­ small risk of failure ­ small cost and tasks; scenarios; usage statistics; plans for the future system; relevant laws, constraints

  2. Master's Thesis A Study on Location-Based Authenticated Key Agreement

    E-Print Network [OSTI]

    Kim, Kwangjo

    Master's Thesis A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor Institute of Science and Technology 2010 #12;A Study on Location-Based Authenticated Key Agreement Scheme in Wireless Sensor and Actor Networks #12;A Study on Location-Based Authenticated Key Agreement Scheme

  3. Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks

    E-Print Network [OSTI]

    Wang, Yongge

    Password Protected Smart Card and Memory Stick Authentication Against Off-Line Dictionary Attacks requirements for remote authentication with password protected smart card. In recent years, several protocols on the password based authentication between a smart card owner and smart card via an untrusted card reader

  4. Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Schage Jorg Schwenk

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Generic Compilers for Authenticated Key Exchange Tibor Jager Florian Kohlar Sven Sch¨age J efficient attacks on the na¨ive combination of these protocols. In this paper, we propose new compilers challenge(s) exchanged during authentication. Keywords: authenticated key agreement, protocol compiler, TLS

  5. Efficient authentication mechanisms for navigation systems a radio-navigation case

    E-Print Network [OSTI]

    Stanford University

    upon the Timed Efficient Stream Loss- Tolerant Authentication (TESLA) algorithm. We analyze and a detailed security analysis of the needed key size, we developed adjusted TESLA, an authentication can use such a small authentication message is due to the insertion of a timestamp into the generation

  6. Mitigating DoS Attacks against Broadcast Authentication in Wireless Sensor Networks

    E-Print Network [OSTI]

    Ning, Peng

    authentication in wireless sensor networks: digital signatures and µTESLA-based techniques. However, both signature-based and µTESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks verifications (in case of signature-based broadcast authentication) or packet forwarding (in case of µTESLA

  7. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Tygar, Doug

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast authentication protocol of receivers, and tolerates packet loss. TESLA is based on loose time synchronization between the sender

  8. ORISE: Human Subjects Research Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    in support of the HSRD database: Database maintenance Federal Internet server access Software development Quality assurancequality control Project assistance Human Subjects...

  9. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Calm, J.M.

    1994-05-27

    The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  10. Nano Databases Nano Business

    E-Print Network [OSTI]

    Xie, Xiaoliang Sunney

    Home News Nano Databases Nano Business Nano Jobs Resources Introduc on to Nanotechnology Open menu's lab. A team of interna onal researchers, led by Lieber, the Mark Hyman, Jr. Professor of Chemistry

  11. Nuclear Science References Database

    E-Print Network [OSTI]

    B. Pritychenko; E. B?ták; B. Singh; J. Totans

    2014-07-08

    The Nuclear Science References (NSR) database together with its associated Web interface, is the world's only comprehensive source of easily accessible low- and intermediate-energy nuclear physics bibliographic information for more than 210,000 articles since the beginning of nuclear science. The weekly-updated NSR database provides essential support for nuclear data evaluation, compilation and research activities. The principles of the database and Web application development and maintenance are described. Examples of nuclear structure, reaction and decay applications are specifically included. The complete NSR database is freely available at the websites of the National Nuclear Data Center http://www.nndc.bnl.gov/nsr and the International Atomic Energy Agency http://www-nds.iaea.org/nsr.

  12. A Random Server Model for Private Information Retrieval (or How to Achieve Information Theoretic PIR Avoiding Database Replication) \\Lambda

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    databases while keeping their queries secret from the database managers. We propose a new model for PIR, utilizing auxiliary random servers to provide privacy services for database access. In this model, prior. In this model, the database is viewed as an n­bit string x out of which the user retrieves the i­th bit x i

  13. Databases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us| DepartmentFunds Recipients |DatabasesDatabases

  14. Crude Oil Analysis Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Shay, Johanna Y.

    The composition and physical properties of crude oil vary widely from one reservoir to another within an oil field, as well as from one field or region to another. Although all oils consist of hydrocarbons and their derivatives, the proportions of various types of compounds differ greatly. This makes some oils more suitable than others for specific refining processes and uses. To take advantage of this diversity, one needs access to information in a large database of crude oil analyses. The Crude Oil Analysis Database (COADB) currently satisfies this need by offering 9,056 crude oil analyses. Of these, 8,500 are United States domestic oils. The database contains results of analysis of the general properties and chemical composition, as well as the field, formation, and geographic location of the crude oil sample. [Taken from the Introduction to COAMDATA_DESC.pdf, part of the zipped software and database file at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the zipped file to your PC. When opened, it will contain PDF documents and a large Excel spreadsheet. It will also contain the database in Microsoft Access 2002.

  15. Testing Database-Centric Applications For Causes of Database Deadlocks

    E-Print Network [OSTI]

    Grechanik, Mark

    the process of software evolution error- prone, expensive, and difficult. Currently, database deadlocksTesting Database-Centric Applications For Causes of Database Deadlocks Mark Grechanik, B. M. Mainul--Many organizations deploy applications that use databases by sending Structured Query Language (SQL) state- ments

  16. The EPILEPSIAE database: An extensive electroencephalography database of epilepsy patients

    E-Print Network [OSTI]

    Timmer, Jens

    The EPILEPSIAE database: An extensive electroencephalography database of epilepsy patients *yz1. In this article we present the EPILEPSIAE database, which was made publicly available in 2012. We illustrate its content and scope. The EPILEPSIAE database provides long-term EEG recordings of 275 patients as well

  17. The GLIMS Glacier Database: a spatio-temporal database

    E-Print Network [OSTI]

    Raup, Bruce H.

    The GLIMS Glacier Database: a spatio-temporal database implemented using Open Source tools Bruce countries #12;#12;#12;#12;#12;System components PostgreSQL (relational database) PostGIS (geospatial) GDAL (Geospatial Data Abstraction Library) Perl, PHP, Shapelib, ... #12;GLIMS Glacier Database System

  18. Database Security Sabrina De Capitani di Vimercati, Dip. Elettronica, Universit a di Brescia, 25123 Brescia, Italy

    E-Print Network [OSTI]

    Samarati, Pierangela

    data stored in a database is called a database management system DBMS. A database can be seen at di of the underlying operating system see Figure 2. Beside access and processing functionalities, each DBMS must also system, one may think that a DBMS does not need to deal with security as security functionalities

  19. Chapter 10 Creating and Maintaining Geographic Databases 131 Creating and Maintaining

    E-Print Network [OSTI]

    Wright, Dawn Jeannine

    (DBMS), a specialist piece of software designed to handle multi-user access to an integrated set of data and versioning. 10 #12;Chapter 10 Creating and Maintaining Geographic Databases 132 KEY WORDS AND CONCEPTS DBMS.2 Database management systems 10.3 Storing data in DBMS tables 10.4 SQL 10.5 Geographic database types

  20. Database Sampling with Functional Dependencies

    E-Print Network [OSTI]

    Riera, Jesús Bisbal

    Database Sampling with Functional Dependencies Jes´us Bisbal, Jane Grimson Department of Computer there is a need to prototype the database which the applications will use when in operation. A prototype database can be built by sampling data from an existing database. Including relevant semantic information when

  1. Non-Cryptographic Authentication and Identification in Wireless Networks

    E-Print Network [OSTI]

    California at Davis, University of

    1 Non-Cryptographic Authentication and Identification in Wireless Networks Kai Zeng, Kannan considered as potential alternatives/complements to provide security services in wireless networks identi- fication in wireless networks using lower/physical layer properties or information. We discuss

  2. On the Authentication of RFID Systems with Bitwise Operations

    E-Print Network [OSTI]

    Poovendran, Radha

    On the Authentication of RFID Systems with Bitwise Operations Basel Alomair Network Security Lab secure authenti- cation via bitwise operations. Following each proposal, a series of papers have been. We divide bitwise operations into two main categories and address the security limitations of each

  3. Automation-considered Logic of Authentication and Key Distribution

    E-Print Network [OSTI]

    Kwon, Taekyoung

    methods are focused on the automation-based model checking that relies on building a finite modelAutomation-considered Logic of Authentication and Key Distribution Taekyoung Kwon1 and Seongan Lim2 Abstract. This paper presents an automation-considered logic of au- thentication for reasoning about

  4. On the Security of the Tor Authentication Protocol

    E-Print Network [OSTI]

    Goldberg, Ian

    On the Security of the Tor Authentication Protocol Ian Goldberg David R. Cheriton School@cs.uwaterloo.ca Abstract. Tor is a popular anonymous Internet communication sys- tem, used by an estimated 250,000 users to anonymously exchange over five terabytes of data per day. The security of Tor depends on properly

  5. KERBEROS: AN AUTHENTICATION SERVICE FOR OPEN NETWORK SYSTEMS

    E-Print Network [OSTI]

    Pâris, Jehan-François

    consists of a Kerberos server and a ticket-granting server (TGS). Once users are authenticated by Kerberos, they receive a TGS ticket. This ticket will allow them to request from the TGS tickets for all the other servers. Kerberos keeps keys for (a) all the system users and (b) the ticket-granting server (TGS

  6. Authenticated Multicast Immune to DenialofService Shouhuai Xu

    E-Print Network [OSTI]

    Xu, Shouhuai

    using Merkle signature tree to tolerate packet loss. Although the cost for generating and verifying for each signature. Perrig et al. [13] propose a solution they call TESLA. The main idea is to let to authenticate the bu#11;ered packet. Although some of the shortcomings of TESLA are overcome in their following

  7. Digital Watermarking for Telltale Tamper Proofing and Authentication

    E-Print Network [OSTI]

    Kundur, Deepa

    Digital Watermarking for Telltale Tamper Proofing and Authentication DEEPA KUNDUR, STUDENT MEMBER the problem of fragile digital watermarking for the tamper proofing of still images. Applications of our domain of the image by quantizing the corresponding coefficients. Tamper detection is pos- sible

  8. Secure Password-Based Authenticated Key Exchange for Web Services

    E-Print Network [OSTI]

    sign-on, delegation, and identity. The Grid Security Infrastructure (GSI) is the name given so. 1.3 Security in Grid Computing Security is one of the major requirements of Grid computing. Any Grid site deployment must at least provide the basic security mechanisms including authentication

  9. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probabili* *ty of the same systems is retained up top___ #G authenticated messages. In a typical state

  10. Stronger security bounds for Wegman-Carter-Shoup authenticators

    E-Print Network [OSTI]

    Bernstein, Daniel

    messages. Here m is a message; n is a nonce chosen from a public group G; f is a secret uniform random permutation of G; h is a secret random function; and ffl is a differential probability of the same systems is retained up top___ #G authenticated messages. In a typical state

  11. Cryptanalysis of a recent two factor authentication scheme

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Centre Dublin City University Ballymun, Dublin 9, Ireland. mike.scott@certivox.com Abstract. Very recently a scheme has been proposed by Wang and Ma for a robust smart-card based password authentication scheme, which claims to be secure against a Smart Card security breach. In this short note we attempt

  12. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Doran, Simon J.

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  13. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a veri cation method described in 14]. The PVS formalization consists of a semantic embedding of CSP, 16, 12, 9]. In 14], Schneider presents such a method based on CSP 7]. The approach relies onageneral

  14. Using a PVS Embedding of CSP to Verify Authentication Protocols

    E-Print Network [OSTI]

    Dutertre, Bruno

    Using a PVS Embedding of CSP to Verify Authentication Protocols To be presented at TPHOLs'97, Bell for a verification method described in [14]. The PVS formalization consists of a semantic embedding of CSP for this purpose [3, 16, 12, 9]. In [14], Schneider presents such a method based on CSP [7]. The approach relies

  15. Ninja : Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments

    E-Print Network [OSTI]

    Mitchell, Chris

    authentication. In emerging ubiquitous computing paradigms which are highly dynamic and mobile in nature, entity, Ubiquitous, Trusted Computing. 1 Introduction In the Mobile VCE1 Core 4 research programme on Ubiquitous User ? IP Backbone? Pervasive User Environment WiMAX Bluetooth Fig. 1. A Ubiquitous Computing

  16. Computer Science: An Overview Database Systems

    E-Print Network [OSTI]

    Lanubile, Filippo

    .1 Database Fundamentals · 9.2 The Relational Model · 9.3 Object-Oriented Databases · 9.4 Maintaining Database of a database without changing the application software that uses it Database Models · Database model: A conceptual view of a d t bdatabase ­ Relational database model ­ Object-oriented database model Copyright

  17. PDS: A Performance Database Server

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Berry, Michael W.; Dongarra, Jack J.; Larose, Brian H.; Letsche, Todd A.

    1994-01-01

    The process of gathering, archiving, and distributing computer benchmark data is a cumbersome task usually performed by computer users and vendors with little coordination. Most important, there is no publicly available central depository of performance data for all ranges of machines from personal computers to supercomputers. We present an Internet-accessible performance database server (PDS) that can be used to extract current benchmark data and literature. As an extension to the X-Windows-based user interface (Xnetlib) to the Netlib archival system, PDS provides an on-line catalog of public domain computer benchmarks such as the LINPACK benchmark, Perfect benchmarks, and the NAS parallelmore »benchmarks. PDS does not reformat or present the benchmark data in any way that conflicts with the original methodology of any particular benchmark; it is thereby devoid of any subjective interpretations of machine performance. We believe that all branches (research laboratories, academia, and industry) of the general computing community can use this facility to archive performance metrics and make them readily available to the public. PDS can provide a more manageable approach to the development and support of a large dynamic database of published performance metrics.« less

  18. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Calm, J.M.

    1992-04-30

    The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on R-32, R-123, R-124, R- 125, R-134a, R-141b, R142b, R-143a, R-152a, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses polyalkylene glycol (PAG), ester, and other lubricants. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits.

  19. PaleoBank, A Relational Database for Invertebrate Paleontology: The Data Model

    E-Print Network [OSTI]

    Krebs, J. W.; Kaesler, R. L.; Brosius, E. A.; Miller, D. L.; Chang, Y. M.

    1996-08-01

    THE UNIVERSITY OF KANSAS PALEONTOLOGICAL CONTRIBUTIONS August 1996 Number 8 PALEOBANK, A RELATIONAL DATABASE FOR INVERTEBRATE PALEONTOLOGY: THE DATA MODEL Jill W. Krebs,' Roger L. Kaesler,'" Elizabeth A. Brosius," Douglas L. Miller,5 and Yi... in electronic databases burgeons. The proper design and management of a complex database necessitates the preparation of a logical data model. PaleoBank, a database that is an extension of the long-standing Treatise on Invertebrate Paleontology, is also intended...

  20. Database Security: A Historical Perspective

    E-Print Network [OSTI]

    Lesov, Paul

    2010-01-01

    The importance of security in database research has greatly increased over the years as most of critical functionality of the business and military enterprises became digitized. Database is an integral part of any information system and they often hold sensitive data. The security of the data depends on physical security, OS security and DBMS security. Database security can be compromised by obtaining sensitive data, changing data or degrading availability of the database. Over the last 30 years the information technology environment have gone through many changes of evolution and the database research community have tried to stay a step ahead of the upcoming threats to the database security. The database research community has thoughts about these issues long before they were address by the implementations. This paper will examine the different topics pertaining to database security and see the adaption of the research to the changing environment. Some short term database research trends will be ascertained ...

  1. High Performance Buildings Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The High Performance Buildings Database is a shared resource for the building industry, a unique central repository of in-depth information and data on high-performance, green building projects across the United States and abroad. The database includes information on the energy use, environmental performance, design process, finances, and other aspects of each project. Members of the design and construction teams are listed, as are sources for additional information. In total, up to twelve screens of detailed information are provided for each project profile. Projects range in size from small single-family homes or tenant fit-outs within buildings to large commercial and institutional buildings and even entire campuses. The database is a data repository as well. A series of Web-based data-entry templates allows anyone to enter information about a building project into the database. Once a project has been submitted, each of the partner organizations can review the entry and choose whether or not to publish that particular project on its own Web site.

  2. Database Systems | Breaking Out of the Box Avi Silberschatz

    E-Print Network [OSTI]

    Silberschatz, Avi

    that keeps corporations running without support from commercial database management systems (DBMS). Today is aimed at increasing the functionality and performance of DBMS's. A DBMS is a very complex system for solving problems of large-scale data management in the corporate setting. However, a DBMS, as does any

  3. REQUEST FOR PROPOSALS GEOTECHNICAL DATABASE DEVELOPMENT, PHASE 3

    E-Print Network [OSTI]

    Harms, Kyle E.

    of existing and future geotechnical data. Other Phase 2 features included a web-based system to access deep Pavement Management Systems (PMS) Section, for the districts to upload boring and core data (thickness in a PMS database called Deighton Total Infrastructure Management System (dTIMS). dTIMS is a data

  4. Defining the questions: a research agenda for nontraditional authentication in arms control

    SciTech Connect (OSTI)

    Hauck, Danielle K [Los Alamos National Laboratory; Mac Arthur, Duncan W [Los Alamos National Laboratory; Smith, Morag K [Los Alamos National Laboratory; Thron, Jonathan L [Los Alamos National Laboratory; Budlong - Sylvester, Kory [Los Alamos National Laboratory

    2010-01-01

    Many traditional authentication techniques have been based on hardware solutions. Thus authentication of measurement system hardware has been considered in terms of physical inspection and destructive analysis. Software authentication has implied hash function analysis or authentication tools such as Rose. Continuity of knowledge is maintained through TIDs and cameras. Although there is ongoing progress improving all of these authentication methods, there has been little discussion of the human factors involved in authentication. Issues of non-traditional authentication include sleight-of-hand substitutions, monitor perception vs. reality, and visual diversions. Since monitor confidence in a measurement system depends on the product of their confidences in each authentication element, it is important to investigate all authentication techniques, including the human factors. This paper will present an initial effort to identify the most important problems that traditional authentication approaches in safeguards have not addressed and are especially relevant to arms control verification. This will include a survey of the literature and direct engagement with nontraditional experts in areas like psychology and human factors. Based on the identification of problem areas, potential research areas will be identified and a possible research agenda will be developed.

  5. Database Systems on Virtual Machines: How Much do You Lose? Umar Farooq Minhas

    E-Print Network [OSTI]

    Aboulnaga, Ashraf

    manageability problems in database systems. For example, these technologies allow for server consolidation run on virtual machines. This offers many op- portunities for researchers in self-managing database sys- tems, but it is also important to understand the cost of virtu- alization. In this paper, we

  6. Workload Management for Big Data Analytics Ashraf Aboulnaga

    E-Print Network [OSTI]

    Aboulnaga, Ashraf

    the resources required to achieve this goal. At a high level, work- load management can be viewed as lookingReduce. Work- load management for parallel databases is an established topic, and most parallel database

  7. The EMIME Mandarin Bilingual Database 

    E-Print Network [OSTI]

    Wester, Mirjam; Liang, Hui

    2011-01-01

    This paper describes the collection of a bilingual database of Mandarin/English data. In addition, the accents of the talkers in the database have been rated. English and Mandarin listeners assessed the English and Mandarin talkers' degree...

  8. DCC Briefing Paper: Database archiving 

    E-Print Network [OSTI]

    Müller, Heiko

    2009-02-02

    In a computational context, data archiving refers to the storage of electronic documents, data sets, multimedia files, and so on, for a defined period of time. Database archiving is usually seen as a subset of data archiving. Database archiving...

  9. Hardware device to physical structure binding and authentication

    SciTech Connect (OSTI)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  10. USING GREEN INFRASTRUCTURE TO MANAGE URBAN STORMWATER QUALITY

    E-Print Network [OSTI]

    Minor, Emily

    USING GREEN INFRASTRUCTURE TO MANAGE URBAN STORMWATER QUALITY: A Review of Selected Practices.................................................................30 The International Stormwater BMP Database..................................................34

  11. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Calm, J.M.

    1992-11-09

    The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air- conditioning and refrigeration equipment. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R- 717 (ammonia), ethers, and others as well as azeotropic and zeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents on compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. A computerized version is available that includes retrieval software.

  12. A Historical Database of Sociocultural Evolution

    E-Print Network [OSTI]

    Turchin, Peter; Whitehouse, Harvey; Francois, Pieter; Slingerland, Edward; Collard, Mark

    2012-01-01

    Historical Database of Sociocultural Evolution Peter TurchinThe Historical Database of Sociocultural Evolution, which weHistorical Database of Sociocultural Evolution. Cliodynamics

  13. A Noisy 10GB Provenance Database

    E-Print Network [OSTI]

    Cheah, You-Wei

    2013-01-01

    Workload The provenance database is generated from theperformance of the provenance database generation process tox-axis). Figure 4 shows the database being populated with

  14. Lessons Learned Database | Department of Energy

    Office of Environmental Management (EM)

    Lessons Learned Database Lessons Learned Database The DOE Corporate Lessons Learned Database provides a central clearinghouse that allows ready access to and communication about...

  15. Simultaneous Authentication and Certification of Arms-Control Measurement Systems

    SciTech Connect (OSTI)

    MacArthur, Duncan W. [Los Alamos National Laboratory; Hauck, Danielle K. [Los Alamos National Laboratory; Thron, Jonathan L. [Los Alamos National Laboratory

    2012-07-09

    Most arms-control-treaty-monitoring scenarios involve a host party that makes a declaration regarding its nuclear material or items and a monitoring party that verifies that declaration. A verification system developed for such a use needs to be trusted by both parties. The first concern, primarily from the host party's point of view, is that any sensitive information that is collected must be protected without interfering in the efficient operation of the facility being monitored. This concern is addressed in what can be termed a 'certification' process. The second concern, of particular interest to the monitoring party, is that it must be possible to confirm the veracity of both the measurement system and the data produced by this measurement system. The monitoring party addresses these issues during an 'authentication' process. Addressing either one of these concerns independently is relatively straightforward. However, it is more difficult to simultaneously satisfy host party certification concerns and monitoring party authentication concerns. Typically, both parties will want the final access to the measurement system. We will describe an alternative approach that allows both parties to gain confidence simultaneously. This approach starts with (1) joint development of the measurement system followed by (2) host certification of several copies of the system and (3) random selection by the inspecting party of one copy to be use during the monitoring visit and one (or more) copy(s) to be returned to the inspecting party's facilities for (4) further hardware authentication; any remaining copies are stored under joint seal for use as spares. Following this process, the parties will jointly (5) perform functional testing on the selected measurement system and then (6) use this system during the monitoring visit. Steps (1) and (2) assure the host party as to the certification of whichever system is eventually used in the monitoring visit. Steps (1), (3), (4), and (5) increase the monitoring party's confidence in the authentication of the measurement system.

  16. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1996-07-01

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  17. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1999-01-01

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilities access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  18. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1996-11-15

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern.

  19. Databases | Department of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAbout Us| DepartmentFunds Recipients |Databases

  20. Noiseless Database Privacy Raghav Bhaskar

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Noiseless Database Privacy Raghav Bhaskar Microsoft Research India rbhaskar@microsoft.com Abhishek as a gold standard in the field of database privacy. While this notion has the benefit of providing concrete explore is to exploit the entropy already present in the database and substitute that in the place

  1. ARTI Refrigerant Database

    SciTech Connect (OSTI)

    Cain, J.M. , Great Falls, VA )

    1993-04-30

    The Refrigerant Database consolidates and facilitates access to information to assist industry in developing equipment using alternative refrigerants. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included. The database identifies sources of specific information on R-32, R-123, R-124, R-125, R-134, R-134a, R-141b, R-142b, R-143a, R-152a, R-245ca, R-290 (propane), R-717 (ammonia), ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, ester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents to accelerate availability of the information and will be completed or replaced in future updates.

  2. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1997-02-01

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufacturers and those using alterative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on various refrigerants. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

  3. ARTI refrigerant database

    SciTech Connect (OSTI)

    Calm, J.M.

    1998-08-01

    The Refrigerant Database is an information system on alternative refrigerants, associated lubricants, and their use in air conditioning and refrigeration. It consolidates and facilitates access to property, compatibility, environmental, safety, application and other information. It provides corresponding information on older refrigerants, to assist manufactures and those using alternative refrigerants, to make comparisons and determine differences. The underlying purpose is to accelerate phase out of chemical compounds of environmental concern. The database provides bibliographic citations and abstracts for publications that may be useful in research and design of air-conditioning and refrigeration equipment. The complete documents are not included, though some may be added at a later date. The database identifies sources of specific information on many refrigerants including propane, ammonia, water, carbon dioxide, propylene, ethers, and others as well as azeotropic and zeotropic blends of these fluids. It addresses lubricants including alkylbenzene, polyalkylene glycol, polyolester, and other synthetics as well as mineral oils. It also references documents addressing compatibility of refrigerants and lubricants with metals, plastics, elastomers, motor insulation, and other materials used in refrigerant circuits. Incomplete citations or abstracts are provided for some documents. They are included to accelerate availability of the information and will be completed or replaced in future updates.

  4. Management'': Sunderraman

    E-Print Network [OSTI]

    Brass, Stefan

    INFSCI 2710 ``Database Management'': B. Oracle SQL*Plus B­1 Appendix B: Oracle SQL*Plus I have used: Oracle/SQL Tutorial, 1999. http://www.db.cs.ucdavis.edu/teaching/sqltutorial/ . Stefan Brass: Skript zur Vorlesung Informationssysteme (in German), UniversitË? at Hildesheim, 1996/97. . SQL*Plus User's Guide

  5. A+M Collisional Databases in ALADDIN Format

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    ALADDIN (A Labelled Atomic Data Interface) is a database system developed in order to provide a standard and flexible format and interface for the exchange and management of atomic, molecular and plasma-material interaction data of interest to fusion research. As part of the Atomic and Molecular Data Information System (AMDIS), introduced by the IAEA Atomic and Molecular Data Unit, the ALADDIN interface is available on-line. Twelve databases from DOE and IAEA sources are available from the CFADC website under the heading A+M Collisional Databases.

  6. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2000-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters; the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible. Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided.

  7. Counterfeit-resistant materials and a method and apparatus for authenticating materials

    DOE Patents [OSTI]

    Ramsey, J. Michael (Knoxville, TN); Klatt, Leon N. (Oak Ridge, TN)

    2001-01-01

    Fluorescent dichroic fibers randomly incorporated within a media provide an improved method for authentication and counterfeiting protection. The dichroism is provided by an alignment of fluorescent molecules along the length of the fibers. The fluorescent fibers provide an authentication mechanism of varying levels of capability. The authentication signature depends on four parameters, the x,y position, the dichroism and the local environment. The availability of so many non-deterministic variables makes production of counterfeit articles (e.g., currency, credit cards, etc.) essentially impossible Counterfeit-resistant articles, an apparatus for authenticating articles, and a process for forming counterfeit-resistant media are also provided&

  8. T-594: IBM solidDB Password Hash Authentication Bypass Vulnerability

    Broader source: Energy.gov [DOE]

    This vulnerability could allow remote attackers to execute arbitrary code on vulnerable installations of IBM solidDB. Authentication is not required to exploit this vulnerability.

  9. T-703: Cisco Unified Communications Manager Open Query Interface...

    Energy Savers [EERE]

    Cisco Unified Communications Manager Open Query Interface Lets Remote Users Obtain Database Contents T-703: Cisco Unified Communications Manager Open Query Interface Lets Remote...

  10. ARM Publications Database

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity ofkandz-cm11 Outreach Home Room News Publications Traditional Knowledge Kiosks Barrow, AlaskaDatabaseSearchTips Publications

  11. Gasification Plant Databases

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantityBonneville Power Administration would likeUniverse (Journal Article)ForthcomingGENERALProblems I n QEstimatesPlant Databases

  12. METU Interoperable Database System A. Dogac, C. Dengi, E. Kilic, G. Ozhan, F. Ozcan, S. Nural, C. Evrendilek,

    E-Print Network [OSTI]

    Arpinar, I. Budak

    of database management systems based on di erent data models and languages (e.g. le systems, relationalMETU Interoperable Database System A. Dogac, C. Dengi, E. Kilic, G. Ozhan, F. Ozcan, S. Nural, C Turkiye email: asuman@srdc.metu.edu.tr Abstract METU INteroperable Database System (MIND) is a mul

  13. A new generic protocol for authentication and key agreement in lightweight systems

    E-Print Network [OSTI]

    Markowitch, Olivier

    A new generic protocol for authentication and key agreement in lightweight systems Na¨im Qachri1 frederic.lafitte@rma.ac.be Abstract. In this paper, we propose a new generic authenticated key agreement protocol where the master secret is automatically renewed based on a sequence of hash values, thus

  14. Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems

    E-Print Network [OSTI]

    Wang, Yongge

    Secure Communication and Authentication Against Off-line Dictionary Attacks in Smart Grid Systems This paper studies the security requirements for remote authentication and communication in smart grid to smart grid systems. For example, in order to unlock the credentials stored in tamper

  15. Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems(observing) about 90 runs of the protocol. Finding a nonce enables a passive attacker to recover all five secret. Key words: : RFID, Authentication Protocol, Passive Attack 1 Introduction As of today, RFID (Radio

  16. Information Theoretic Bounds on Authentication Systems in Query Reihaneh Safavi-Naini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi-Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  17. Information Theoretic Bounds on Authentication Systems in Query Reihaneh SafaviNaini Peter Wild

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Information Theoretic Bounds on Authentication Systems in Query Model Reihaneh Safavi­Naini Peter Wild School of IT and CS Information Security Group University of Wollongong Royal Holloway University Authentication codes provide message integrity guarantees in an information theoretic sense within a symmetric

  18. Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME

    E-Print Network [OSTI]

    Proving Correctness of the Basic TESLA Multicast Stream Authentication Protocol with TAME Presented, Washington, DC 20375 E-mail: archer@itd.nrl.navy.mil The TESLA multicast stream authentication protocol just been revealed. While an informal argument for the correctness of TESLA has been published

  19. The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol # Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss­tolerant Authentication) broadcast au­ thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro­ nization between

  20. The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song

    E-Print Network [OSTI]

    Perrig, Adrian

    The TESLA Broadcast Authentication Protocol Adrian Perrig Ran Canetti J. D. Tygar Dawn Song presents the TESLA (Timed Efficient Stream Loss-tolerant Authentication) broadcast au- thentication numbers of receivers, and tolerates packet loss. TESLA is based on loose time synchro- nization between

  1. CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider

    E-Print Network [OSTI]

    Doran, Simon J.

    CSP, PVS and a Recursive Authentication Protocol Jeremy Bryans and Steve Schneider Department In this paper we consider the nature of machine proofs used in the CSP approach to the veri cation of authentication protocols using the process algebra CSP Hoa85]. The CSP syntax provides a natural and precise way

  2. Database Manipulation on Quantum Computers

    E-Print Network [OSTI]

    Ahmed Younes

    2007-05-29

    Manipulating a database system on a quantum computer is an essential aim to benefit from the promising speed-up of quantum computers over classical computers in areas that take a vast amount of storage and processing time such as in databases. In this paper, the basic operations for manipulating the data in a quantum database will be defined, e.g. INSERT, UPDATE, DELETE, SELECT, backing up and restoring a database file. This gives the ability to perform the data processing that usually takes a long processing time on a classical database system, in a simultaneous way on a quantum computer. Defining a quantum version of more advanced concepts used in database systems, e.g. the referential integrity and the relational algebra, is a normal extension to this work

  3. A Novel Trigon based Dual Authentication Protocol for Enhancing Security in Grid Environment

    E-Print Network [OSTI]

    Ruckmani, V

    2010-01-01

    In recent times, a necessity has been raised in order to distribute computing applications often across grids. These applications are dependent on the services like data transfer or data portal services as well as submission of jobs. Security is of utmost importance in grid computing applications as grid resources are heterogeneous, dynamic, and multidomain. Authentication remains as the significant security challenge in grid environment. In traditional authentication protocol a single server stores the sensitive user credentials, like username and password. When such a server is compromised, a large number of user passwords, will be exposed. Our proposed approach uses a dual authentication protocol in order to improve the authentication service in grid environment. The protocol utilizes the fundamental concepts of trigon and based on the parameters of the trigon the user authentication will be performed. In the proposed protocol, the password is interpreted and alienated into more than one unit and these uni...

  4. Energy Citations Database (ECD) - Architecture

    Office of Scientific and Technical Information (OSTI)

    Search Architecture - What Is under the hood? The Energy Citations Database makes searchable over two million bibliographic citations for energy and energy related STI from the...

  5. Energy Citations Database (ECD) - About

    Office of Scientific and Technical Information (OSTI)

    About ECD The Energy Citations Database (1943 - Present) was developed by the U.S. Department of Energy (DOE) Office of Scientific and Technical Information (OSTI) to improve...

  6. Energy Citations Database (ECD) - Widget

    Office of Scientific and Technical Information (OSTI)

    Energy Citations Database Widget You can access key features from the Department of Energy's Office of Scientific and Technical Information (DOEOSTI) by downloading the Energy...

  7. Ribosomal Database Project II

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Ribosomal Database Project (RDP) provides ribosome related data and services to the scientific community, including online data analysis and aligned and annotated Bacterial small-subunit 16S rRNA sequences. As of March 2008, RDP Release 10 is available and currently (August 2009) contains 1,074,075 aligned 16S rRNA sequences. Data that can be downloaded include zipped GenBank and FASTA alignment files, a histogram (in Excel) of the number of RDP sequences spanning each base position, data in the Functional Gene Pipeline Repository, and various user submitted data. The RDP-II website also provides numerous analysis tools.[From the RDP-II home page at http://rdp.cme.msu.edu/index.jsp

  8. THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky

    E-Print Network [OSTI]

    Franek, Frantisek

    of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules­based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

  9. THE SIMULATION OF BUSINESS RULES IN ACTIVE DATABASES USING EXPERT SYSTEM Ivan Bruha and Frantisek Franek Vladimir L. Rosicky

    E-Print Network [OSTI]

    Franek, Frantisek

    of Database Management Systems (DBMS) is concerned with an augmentation of DBMS by rules. Passive rules-based DBMS by business rules in mostly declarative form (as opposed to the more usual, but less manageable

  10. The rice kinase database. A phylogenomic database for the rice kinome.

    E-Print Network [OSTI]

    Dardick, Christopher; Chen, Johann; Richter, Todd; Ouyang, Shu; Ronald, Pamela

    2007-01-01

    Bioinformatics The Rice Kinase Database.A Phylogenomic Database for the Rice Kinome 1[OA]created a phylogenomic database (http://rkd.ucdavis.edu) to

  11. ORISE: Asset Readiness Management System (ARMS)

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Asset Readiness Management System (ARMS) Database tracks emergency response exercises and equipment to help DOE asses emergency preparedness Developed by the Oak Ridge Institute...

  12. PIA - Environmental Management Consolidated Business Center ...

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Test Reactor National Scientific User Facility Users Week 2009 LM Records Handling System (LMRHS01) - Rocky Flats Environmental Records Database, Office of Legacy Management...

  13. Oracle Database DBFS Hierarchical Storage Overview

    SciTech Connect (OSTI)

    Rivenes, A

    2011-07-25

    The National Ignition Facility (NIF) at the Lawrence Livermore National Laboratory creates large numbers of images during each shot cycle for the analysis of optics, target inspection and target diagnostics. These images must be readily accessible once they are created and available for the 30 year lifetime of the facility. The Livermore Computing Center (LC) runs a High Performance Storage System (HPSS) that is capable of storing NIF's estimated 1 petabyte of diagnostic images at a fraction of what it would cost NIF to operate its own automated tape library. With Oracle 11g Release 2 database, it is now possible to create an application transparent, hierarchical storage system using the LC's HPSS. Using the Oracle DBMS-LOB and DBMS-DBFS-HS packages a SecureFile LOB can now be archived to storage outside of the database and accessed seamlessly through a DBFS 'link'. NIF has chosen to use this technology to implement a hierarchical store for its image based SecureFile LOBs. Using a modified external store and DBFS links, files are written to and read from a disk 'staging area' using Oracle's backup utility. Database external procedure calls invoke OS based scripts to manage a staging area and the transfer of the backup files between the staging area and the Lab's HPSS.

  14. Wind turbine reliability database update.

    SciTech Connect (OSTI)

    Peters, Valerie A.; Hill, Roger Ray; Stinebaugh, Jennifer A.; Veers, Paul S.

    2009-03-01

    This report documents the status of the Sandia National Laboratories' Wind Plant Reliability Database. Included in this report are updates on the form and contents of the Database, which stems from a fivestep process of data partnerships, data definition and transfer, data formatting and normalization, analysis, and reporting. Selected observations are also reported.

  15. Improving Mobile Database Access Over Wide-Area Networks Without

    E-Print Network [OSTI]

    relationship management, asset tracking, and resource scheduling. A key contrib- utor to this success without degrading consistency. Cedar exploits the disk storage and processing power of a mobile client be used to reduce data transmission volume from a database server. The reduc- tion is achieved by using

  16. Mining Databases and Data Streams with Query Languages and Rules

    E-Print Network [OSTI]

    Zaniolo, Carlo

    Mining Databases and Data Streams with Query Languages and Rules Carlo Zaniolo Computer Science that are beyond the reach of traditional Data Base Management Systems (DBMS), data mining stands out because extensions that have proven very effective at supporting data mining. Finally, we turn our attention

  17. Data Page Layouts for Relational Databases on Deep Memory Hierarchies

    E-Print Network [OSTI]

    /O performance and organized records sequentially on disk pages using the N-ary Storage Model (NSM) (a.k.a in database management systems is the N-ary Storage Model (NSM, a.k.a., slotted pages). NSM stores records

  18. Vienna Database Library Version 1.0

    E-Print Network [OSTI]

    Neumaier, Arnold

    Vienna Database Library Version 1.0 Reference Manual Hermann Schichl University of Vienna.2.14 #12;CONTENTS 1 Contents 1 Introduction 1 2 Vienna Database Library Module Index 3 3 Vienna Database Library Hierarchical Index 3 4 Vienna Database Library Compound Index 5 5 Vienna Database Library File

  19. Documentation for database.txt Description

    E-Print Network [OSTI]

    Gilchrist, Michael A.

    Documentation for database.txt Description: The file database.txtis a 163MB file which contains a pair-wise list of all the proteins seen in the TAP and HMS-PCI databases as well as the MIPS Complex-wise association. See Gilchrist et al. (2003) for more details. About database.txt: The database is available

  20. QProber: A System for Automatic Classification of Hidden-Web Databases

    E-Print Network [OSTI]

    Sahami, Mehran

    Analysis and Indexing]: Abstracting Methods; H.3.3 [Information Storage and Retrieval]: Information Search and Retrieval]: Digital Libraries; H.2.4 [Database Management]: Systems--textual databases, distributed This material is based upon work supported by the National Science Foundation under Grants No. IIS-97

  1. RemusDB: Transparent High Availability for Database Umar Farooq Minhas Shriram Rajagopalan Brendan Cully Ashraf

    E-Print Network [OSTI]

    Aboulnaga, Ashraf

    present a technique for building a high-availability (HA) database management system (DBMS). The proposed technique can be ap- plied to any DBMS with little or no customization, and with reasonable performance capabilities. We show that while Remus and similar systems can protect a DBMS, database workloads incur

  2. A Bayesian Approach to Online Performance Modeling for Database Appliances using Gaussian Models

    E-Print Network [OSTI]

    Poupart, Pascal

    - tain peak performance for database management systems (DBMS), database administrators (DBAs) need. Accurately predicting response times of DBMS queries is necessary for a DBA to effectively achieve and highly accurate online DBMS performance model that is robust in the face of changing workloads, data

  3. A Semantic Approach for Schema Evolution and Versioning in ObjectOriented Databases

    E-Print Network [OSTI]

    Franconi, Enrico

    A Semantic Approach for Schema Evolution and Versioning in Object­Oriented Databases Enrico In this paper a semantic approach for the specification and the management of databases with evolving schemata is introduced. It is shown how a general object­oriented model for schema versioning and evolution can

  4. Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters

    E-Print Network [OSTI]

    Amza, Cristiana

    content web servers. We use a unified approach to load and fault management based on dynamic data,kaloianm,jinchen,ashvin,amza}@eecg.toronto.edu Abstract This paper introduces a self-configuring architecture for scaling the database tier of dynamic scheduling dy- namically allocates tasks to commodity databases across workloads in response to peak loads

  5. Use of incident databases for cause and consequence analysis and national estimates 

    E-Print Network [OSTI]

    Obidullah, A.S.M.

    2007-04-25

    Many incidents have occurred because industries have ignored past incidents or failed to learn lessons from the past. Incident databases provide an effective option for managing large amounts of information about the past ...

  6. Investigating Database Security in a Networked Environment

    E-Print Network [OSTI]

    Wagner, Paul J.

    Investigating Database Security in a Networked Environment Matthew Giuliani Computer Science wagnerpj@uwec.edu Abstract Database and network security have traditionally been separate fields within flowing between client and database systems. Although vender specific information is available for many

  7. Meteorological database for the United States

    E-Print Network [OSTI]

    Apte, M.G.

    2011-01-01

    to Indoor Air Meteorological Database for the United StatesUC-402 Meteorological Database for the United States M.G.Abstract A meteorological database has been developed to aid

  8. Unit  045 - Non-Spatial Database Models

    E-Print Network [OSTI]

    045, CC in GIScience; Meyer, Thomas H.

    2000-01-01

    25 Unit 045 - Non-Spatial Database Models Core Curriculum -26 Unit 045 - Non-Spatial Database Models Core Curriculum -27 Unit 045 - Non-Spatial Database Models Core Curriculum -

  9. Unit 11 - Spatial Objects and Database Models

    E-Print Network [OSTI]

    Unit 11, CC in GIS; Nyerges, Timothy L.

    1990-01-01

    Spatial Objects and Database Models NCGIA Core Curriculum inSpatial Objects and Database Models NCGIA Core Curriculum inSpatial Objects and Database Models NCGIA Core Curriculum in

  10. Updating Disjunctive Databases via Model Trees

    E-Print Network [OSTI]

    Gryz, Jarek

    Updating Disjunctive Databases via Model the update problem for disjunctive databases represented by model trees. The concept of a model tree was introduced in [4] to provide a compact representation for disjunctive databases in terms of minimal models

  11. Holographic Labeling And Reading Machine For Authentication And Security Appications

    DOE Patents [OSTI]

    Weber, David C. (Rancho Santa Margarita, CA); Trolinger, James D. (Costa Mesa, CA)

    1999-07-06

    A holographic security label and automated reading machine for marking and subsequently authenticating any object such as an identification badge, a pass, a ticket, a manufactured part, or a package is described. The security label is extremely difficult to copy or even to read by unauthorized persons. The system comprises a holographic security label that has been created with a coded reference wave, whose specification can be kept secret. The label contains information that can be extracted only with the coded reference wave, which is derived from a holographic key, which restricts access of the information to only the possessor of the key. A reading machine accesses the information contained in the label and compares it with data stored in the machine through the application of a joint transform correlator, which is also equipped with a reference hologram that adds additional security to the procedure.

  12. Introducing a New Section—Databases

    E-Print Network [OSTI]

    Turchin, Peter

    2012-01-01

    Historical Database of Sociocultural Evolution, described inand database papers, Cliodynamics continues the publication of book reviews and review essays, as well as special features from the Social Evolution

  13. Fire Protection Database | Department of Energy

    Office of Environmental Management (EM)

    Fire Protection Database Fire Protection Database DOE O 231.1, Environment, Safety, And Health Reporting, requires the submission of an Annual Fire Protection Summary. The previous...

  14. National Residential Efficiency Measures Database - Building...

    Energy Savers [EERE]

    National Residential Efficiency Measures Database - Building America Top Innovation National Residential Efficiency Measures Database - Building America Top Innovation Image of a...

  15. Westlaw China Westlaw China English Database

    E-Print Network [OSTI]

    Po, Lai-Man

    Guide 3 Steps: 1. Enter search term(s) into the search box. 2. Choose databases by checking............................................................................................................................................................... 2 Cross-Database Search ........................................................................................................................................ 3 Search and Browse

  16. Marine and Hydrokinetic Technology Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    DOE’s Marine and Hydrokinetic Technology Database provides up-to-date information on marine and hydrokinetic renewable energy, both in the U.S. and around the world. The database includes wave, tidal, current, and ocean thermal energy, and contains information on the various energy conversion technologies, companies active in the field, and development of projects in the water. Depending on the needs of the user, the database can present a snapshot of projects in a given region, assess the progress of a certain technology type, or provide a comprehensive view of the entire marine and hydrokinetic energy industry. Results are displayed as a list of technologies, companies, or projects. Data can be filtered by a number of criteria, including country/region, technology type, generation capacity, and technology or project stage. The database was updated in 2009 to include ocean thermal energy technologies, companies, and projects.

  17. Energy Citations Database (ECD) - Comments

    Office of Scientific and Technical Information (OSTI)

    Contact Us If you have a question about Energy Citations Database, we recommend you check frequently asked questions. If your question still has not been answered or if you wish to...

  18. Rice Glycosyltransferase (GT) Phylogenomic Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Ronald, Pamela

    The Ronald Laboratory staff at the University of California-Davis has a primary research focus on the genes of the rice plant. They study the role that genetics plays in the way rice plants respond to their environment. They created the Rice GT Database in order to integrate functional genomic information for putative rice Glycosyltransferases (GTs). This database contains information on nearly 800 putative rice GTs (gene models) identified by sequence similarity searches based on the Carbohydrate Active enZymes (CAZy) database. The Rice GT Database provides a platform to display user-selected functional genomic data on a phylogenetic tree. This includes sequence information, mutant line information, expression data, etc. An interactive chromosomal map shows the position of all rice GTs, and links to rice annotation databases are included. The format is intended to "facilitate the comparison of closely related GTs within different families, as well as perform global comparisons between sets of related families." [From http://ricephylogenomics.ucdavis.edu/cellwalls/gt/genInfo.shtml] See also the primary paper discussing this work: Peijian Cao, Laura E. Bartley, Ki-Hong Jung and Pamela C. Ronalda. Construction of a Rice Glycosyltransferase Phylogenomic Database and Identification of Rice-Diverged Glycosyltransferases. Molecular Plant, 2008, 1(5): 858-877.

  19. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Min Liang; Li Yang

    2012-05-10

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  20. Quantum public-key algorithms to encrypt and authenticate quantum messages with information-theoretic security

    E-Print Network [OSTI]

    Liang, Min

    2012-01-01

    Public-key cryptosystems for quantum messages are considered from two aspects: public-key encryption and public-key authentication. Firstly, we propose a general construction of quantum public-key encryption scheme, and then construct an information-theoretic secure instance. Then, we propose a quantum public-key authentication scheme, which can protect the integrity of quantum messages. This scheme can both encrypt and authenticate quantum messages. It is information-theoretic secure with regard to encryption, and the success probability of tampering decreases exponentially with the security parameter with regard to authentication. Compared with classical public-key cryptosystems, one private-key in our schemes corresponds to an exponential number of public-keys, and every quantum public-key used by the sender is an unknown quantum state to the sender.

  1. Using Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies

    E-Print Network [OSTI]

    Washington at Seattle, University of

    library . . . . . . . . . . . 3 2 Average correct classification rates for the five meat groupsUsing Unlabelled Data To Update Classification Rules With Applications In Food Authenticity Studies programme. #12;Abstract A classification method is developed to classify samples when both labelled

  2. Entity Authentication Schemes Using Braid Word Reduction Herve SIBERT, Patrick DEHORNOY, and Marc GIRAULT

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Entity Authentication Schemes Using Braid Word Reduction Herv´e SIBERT, Patrick DEHORNOY, and Marc, AND MARC GIRAULT 2. Difficult braid problems 2.1. Braid groups. For n 2, Artin's braid group Bn is defined

  3. Subverting value hierarchies : essays on the causes and responses to shifts in demand for authenticity

    E-Print Network [OSTI]

    Hahl, Oliver (Oliver Douglas)

    2013-01-01

    This dissertation includes three essays on the causes and responses to shifts in demand for authenticity. In the first chapter, I answer the question: why do previously cast-off products, practices, or styles abruptly ...

  4. The Emotional and Spiritual Dimensions of Being a Pastor: Authenticity and Identity 

    E-Print Network [OSTI]

    Otey, Penny Addison

    2011-10-21

    Emotional labor and its influence on authenticity and identity amongst human service workers has been the focus of numerous studies. Often these studies viewed identity as a stable sense of self. This study set out to examine emotional labor amongst...

  5. V-236: MediaWiki CentralAuth Extension Authentication Bypass...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    an error when handling auto-logins and can be exploited to bypass the authentication mechanism by providing a valid username within the "centralauthUser" cookie. IMPACT: Security...

  6. The Role of Psychological Needs for Autonomy, Competence, Relatedness and Money-luxury in State Authenticity 

    E-Print Network [OSTI]

    Renwick, Louisa Catherine

    2009-07-03

    This study aimed to determine the effects of psychological needs on states of authenticity. Self-determination theory proposes three basic psychological needs, for autonomy, competence and relatedness (Deci & Ryan, 1985). ...

  7. Cost to performance analysis of selected stormwater quality best management practices

    E-Print Network [OSTI]

    Landphair, Harlow C.

    2001-01-01

    Data Summary of Urban Stormwater Management Practices:Performance Database for Stormwater Treatment Practices:ANALYSIS OF SELECTED STORMWATER QUALITY BEST MANAGEMENT

  8. AUTHENTICATED SENSOR INTERFACE DEVICE FOR JOINT USE SAFEGUARDS APPLICATIONS - CONCEPTS AND CHALLENGES

    SciTech Connect (OSTI)

    Poland, R.; Drayer, R.; Wilson, J.

    2013-08-12

    This paper will discuss the key features of the Authenticated Sensor Interface Device that collectively provide the ability to share data among a number of parties while ensuring the authentication of data and protecting both the operator’s and the IAEA’s interests. The paper will also discuss the development of the prototype, the initial testing with an accountancy scale, and future plans and challenges to implementation into the joint use and remote monitoring applications. As nuclear fuel cycle technology becomes more prevalent throughout the world and the capacity of plants increases, limited resources of the IAEA are being stretched near a breaking point. A strategy is to increase efficiency in safeguards monitoring using “joint use” equipment that will provide the facility operator process data while also providing the IAEA key safeguards data. The data, however, must be authenticated and validated to ensure the data have not been tampered with. The Authenticated Sensor Interface Device provides the capability to share data and can be a valuable component in the IAEA’s ability to collect accountancy data from scales in Uranium conversion and enrichment plants, as well as nuclear fuel fabrication plants. Likewise, the Authenticated Sensor Interface Device can be configured to accept a diverse array of input signals, ranging from analog voltage, to current, to digital interfaces and more. These modular capabilities provide the ability to collect authenticated, joint-use, data streams from various process monitoring sensors.

  9. Approved Module Information for LE3024, 2014/5 Module Title/Name: Leadership & Management

    E-Print Network [OSTI]

    Neirotti, Juan Pablo

    will learn how to: select and use data and information from primary sources (e.g. authentic dataApproved Module Information for LE3024, 2014/5 Module Title/Name: Leadership & Management Module? Not Specified Module Credits: 20 Module Management Information Module Leader Name Judith Baxter

  10. DATATRIEVE used in a control-system database

    SciTech Connect (OSTI)

    Greene, N.E.

    1983-01-01

    Process control of the Proton Storage Ring at Los Alamos will be accomplished by LSI-11/23 computers networked with a VAX-11/750. The database contains descriptions, status, and parameters of the hardware channels and equipment connected to the LSIs. Database entry and processing occur on the VAX, largely through DATATRIEVE user-friendly procedures. Data validity is checked during and after data entry by DATATRIEVE and FORTRAN language procedures. The database then is distilled into a machine-efficient form and distributed to the LSIs and VAX for use by the process-control software. This paper includes an overview of our application, an overview of DATATRIEVE, examples of DATATRIEVE concepts, features of DATATRIEVE that have been especially useful, features of DATATRIEVE that have been troublesome in this project, notes about the conversion from DATATRIEVE-11 to VAX-11 DATATRIEVE, and observations on data-management software in a control-system environment.

  11. WMC Database Evaluation. Case Study Report

    SciTech Connect (OSTI)

    Palounek, Andrea P. T

    2015-10-29

    The WMC Database is ultimately envisioned to hold a collection of experimental data, design information, and information from computational models. This project was a first attempt at using the Database to access experimental data and extract information from it. This evaluation shows that the Database concept is sound and robust, and that the Database, once fully populated, should remain eminently usable for future researchers.

  12. Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)

    SciTech Connect (OSTI)

    Timothy R. Carr; Scott W. White

    2002-06-01

    This annual report describes progress of the project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. This project, funded by the Department of Energy, is a cooperative project that assembles a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project is working to provide advanced distributed computing solutions to link database servers across the five states into a single system where data is maintained at the local level but is accessed through a single Web portal and can be queried, assembled, analyzed and displayed. Each individual state has strengths in data gathering, data manipulation and data display, including GIS mapping, custom application development, web development, and database design. Sharing of expertise provides the critical mass of technical expertise to improve CO{sub 2} databases and data access in all states. This project improves the flow of data across servers in the five states and increases the amount and quality of available digital data. The MIDCARB project is developing improved online tools to provide real-time display and analyze CO{sub 2} sequestration data. The system links together data from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

  13. Korean Classics Indexing Project Database Korean Classics Indexing Project Database is a

    E-Print Network [OSTI]

    Po, Lai-Man

    Korean Classics Indexing Project Database · Korean Classics Indexing Project Database is a database written in Chinese · The database serves as a discovery tool to support teaching, learning and research's works shows that the Korean Database can help promote not only the research of Korean studies, but also

  14. National Residential Efficiency Measures Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The National Residential Efficiency Measures Database is a publicly available, centralized resource of residential building retrofit measures and costs for the U.S. building industry. With support from the U.S. Department of Energy, NREL developed this tool to help users determine the most cost-effective retrofit measures for improving energy efficiency of existing homes. Software developers who require residential retrofit performance and cost data for applications that evaluate residential efficiency measures are the primary audience for this database. In addition, home performance contractors and manufacturers of residential materials and equipment may find this information useful. The database offers the following types of retrofit measures: 1) Appliances, 2) Domestic Hot Water, 3) Enclosure, 4) Heating, Ventilating, and Air Conditioning (HVAC), 5) Lighting, 6) Miscellaneous.

  15. DOE Global Energy Storage Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The DOE International Energy Storage Database has more than 400 documented energy storage projects from 34 countries around the world. The database provides free, up-to-date information on grid-connected energy storage projects and relevant state and federal policies. More than 50 energy storage technologies are represented worldwide, including multiple battery technologies, compressed air energy storage, flywheels, gravel energy storage, hydrogen energy storage, pumped hydroelectric, superconducting magnetic energy storage, and thermal energy storage. The policy section of the database shows 18 federal and state policies addressing grid-connected energy storage, from rules and regulations to tariffs and other financial incentives. It is funded through DOE’s Sandia National Laboratories, and has been operating since January 2012.

  16. U-211: EMC Celerra/VNX/VNXe Access Control Bug Lets Remote Authenticated Users Access Files/Directories

    Broader source: Energy.gov [DOE]

    A vulnerability was reported in EMC Celerra/VNX/VNXe. A remote authenticated user can access files and directories on the target file system.

  17. Authenticity as a state; its mediating relationship between mood and wellbeing, and the role of self-consciousness 

    E-Print Network [OSTI]

    Ames, Sophie

    2009-07-03

    State versus trait: the experiment explored the dichotomy in personality theory by investigating whether judgements of authenticity were susceptible to different mood conditions. Life satisfaction and self consciousness ...

  18. The CERN Accelerator Measurement Database: On The Road To Federation

    E-Print Network [OSTI]

    Roderick, C; Gourber Pace, M; Hoibian, N; Peryt, M

    2011-01-01

    The Measurement database, acting as short-term central persistence and front-end of the CERN accelerator Logging Service, receives billions of time-series data per day for 200,000+ signals. A variety of data acquisition systems on hundreds of front-end computers publish source data that eventually end up being logged in the Measurement database. As part of a federated approach to data management, information about source devices are defined in a Configuration database, whilst the signals to be logged are defined in the Measurement database. A mapping, which is often complex and subject to change/extension, is required in order to subscribe to the source devices, and write the published data to the corresponding named signals. Since 2005, this mapping was done by means of dozens of XML files, which were manually maintained by multiple persons, resulting in a configuration that was error prone. In 2010 this configuration was fully centralized in the Measurement database itself, reducing significantly the compl...

  19. Microbial Metabolism Databases of Microbial

    E-Print Network [OSTI]

    Huang, Ching-Tsan

    1 Microbial Metabolism Databases of Microbial Metabolism & Degradation Ching-Tsan Huang () Office://www.ebi.ac.uk/ http://umbbd.msi.umn.edu/index.html #12;9 http://umbbd.msi.umn.edu/meta/meta_map.html #12;10 Microbial, Energy, Lipids, Nucleotides, Amino acids, Glycans, Polyketides/Nonribosome peptides, Secondary

  20. Mobile Database Ouri Wolfson1

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    that resides on a mobile device such as a PDA, a smart phone, or a laptop. Such devices are often limited in resources such as memory, computing power, and battery power. Key Points Due to device limitations, a mobile are usually posed by the user of the mobile device. Updates of the database may originate from the user

  1. 29.01.03.M1.03 Information Resources-Account Management Page 1 of 5 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    29.01.03.M1.03 Information Resources- Account Management Page 1 of 5 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.03 Information Resources ­ Account Management Approved July 18, 2005 Revised February of establishing confidence in the identity of users or information systems. There are many ways to authenticate

  2. U-254: Webmin Flaws Let Remote Authenticated Users Execute Arbitrary...

    Broader source: Energy.gov (indexed) [DOE]

    Cisco Connected Grid Network Management System Multiple Vulnerabilities V-104: Oracle Java Flaw Lets Remote Users Execute Arbitrary Code U-255: Apache Wicket Input Validation...

  3. A Tree-Based TESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu Sushil Jajodia

    E-Print Network [OSTI]

    Zhu, Sencun

    A Tree-Based µTESLA Broadcast Authentication for Sensor Networks Donggang Liu Peng Ning Sencun Zhu to multiple nodes in an authenticated way. µTESLA and multi-level µTESLA have been proposed to provide of senders. Though multi-level µTESLA schemes can scale up to large sensor networks (in terms of receivers

  4. Relational Database SQL: Querying the Relational DB

    E-Print Network [OSTI]

    Qiu, Weigang

    Standards and Dialects ISO SQL:2008 DBMS vendors offer their own extensions Oracle PostgreSQL MySQL Weigang: auto-completion and command history Weigang Qiu Relational Database & SQL #12;Relational Database SQL

  5. Proposal for a High Energy Nuclear Database

    E-Print Network [OSTI]

    Brown, David A.; Vogt, Ramona

    2005-01-01

    Proposal for a High Energy Nuclear Database XML documentsProposal for a High Energy Nuclear Database David A. Brown 1it requires the high-energy nuclear physics com- munity’s ?

  6. Reversible Image Authentication with Tamper Localization Based on Integer Wavelet Transform

    E-Print Network [OSTI]

    Devi, P Meenakshi; Duraiswamy, K

    2009-01-01

    In this paper, a new reversible image authentication technique with tamper localization based on watermarking in integer wavelet transform is proposed. If the image authenticity is verified, then the distortion due to embedding the watermark can be completely removed from the watermarked image. If the image is tampered, then the tampering positions can also be localized. Two layers of watermarking are used. The first layer embedded in spatial domain verifies authenticity and the second layer embedded in transform domain provides reversibility. This technique utilizes selective LSB embedding and histogram characteristics of the difference images of the wavelet coefficients and modifies pixel values slightly to embed the watermark. Experimental results demonstrate that the proposed scheme can detect any modifications of the watermarked image.

  7. 29.01.03.M1.14 Information Resources Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE

    E-Print Network [OSTI]

    Behmer, Spencer T.

    29.01.03.M1.14 Information Resources ­ Password-based Authentication Page 1 of 7 STANDARD ADMINISTRATIVE PROCEDURE 29.01.03.M1.14 Information Resources ­ Password-based Authentication Approved July 18 authentication is a means to control who has access to an information resource system. Controlling the access

  8. Webinar: NREL's Fuel Cell Contaminant Database

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar titled "NREL's Fuel Cell Contaminant Database," originally presented on May 27, 2014.

  9. GDB - Human Genome Database final report

    SciTech Connect (OSTI)

    Talbot, C. Conover, Jr.

    2002-01-08

    This is the DOE final report for the GDB, Human Genome Database, project at the Johns Hopkins University.

  10. Webinar: Hydrogen Storage Materials Database Demonstration

    Broader source: Energy.gov [DOE]

    Video recording and text version of the webinar, Hydrogen Storage Materials Database Demonstration, originally presented on December 13, 2011.

  11. The Majorana Parts Tracking Database

    E-Print Network [OSTI]

    The Majorana Collaboration; N. Abgrall; E. Aguayo; F. T. Avignone III; A. S. Barabash; F. E. Bertrand; V. Brudanin; M. Busch; D. Byram; A. S. Caldwell; Y-D. Chan; C. D. Christofferson; D. C. Combs; C. Cuesta; J. A. Detwiler; P. J. Doe; Yu. Efremenko; V. Egorov; H. Ejiri; S. R. Elliott; J. Esterline; J. E. Fast; P. Finnerty; F. M. Fraenkle; A. Galindo-Uribarri; G. K. Giovanetti; J. Goett; M. P. Green; J. Gruszko; V. E. Guiseppe; K. Gusev; A. L. Hallin; R. Hazama; A. Hegai; R. Henning; E. W. Hoppe; S. Howard; M. A. Howe; K. J. Keeter; M. F. Kidd; O. Kochetov; S. I. Konovalov; R. T. Kouzes; B. D. LaFerriere; J. Diaz Leon; L. E. Leviner; J. C. Loach; J. MacMullin; R. D. Martin; S. J. Meijer; S. Mertens; M. L. Miller; L. Mizouni; M. Nomachi; J. L. Orrell; C. O'Shaughnessy; N. R. Overman; R. Petersburg; D. G. Phillips II; A. W. P. Poon; K. Pushkin; D. C. Radford; J. Rager; K. Rielage; R. G. H. Robertson; E. Romero-Romero; M. C. Ronquest; B. Shanks; T. Shima; M. Shirchenko; K. J. Snavely; N. Snyder; A. Soin; A. M. Suriano; D. Tedeschi; J. Thompson; V. Timkin; W. Tornow; J. E. Trimble; R. L. Varner; S. Vasilyev; K. Vetter; K. Vorren; B. R. White; J. F. Wilkerson; C. Wiseman; W. Xu; E. Yakushev; A. R. Young; C. -H. Yu; V. Yumatov; I. Zhitnikov

    2015-02-05

    The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

  12. The Majorana Parts Tracking Database

    E-Print Network [OSTI]

    Abgrall, N; Avignone, F T; Bertrand, F E; Brudanin, V; Busch, M; Byram, D; Caldwell, A S; Chan, Y-D; Christofferson, C D; Combs, D C; Cuesta, C; Detwiler, J A; Doe, P J; Efremenko, Yu; Egorov, V; Ejiri, H; Elliott, S R; Esterline, J; Fast, J E; Finnerty, P; Fraenkle, F M; Galindo-Uribarri, A; Giovanetti, G K; Goett, J; Green, M P; Gruszko, J; Guiseppe, V E; Gusev, K; Hallin, A L; Hazama, R; Hegai, A; Henning, R; Hoppe, E W; Howard, S; Howe, M A; Keeter, K J; Kidd, M F; Kochetov, O; Kouzes, R T; LaFerriere, B D; Leon, J Diaz; Leviner, L E; Loach, J C; MacMullin, J; Martin, R D; Meijer, S J; Mertens, S; Miller, M L; Mizouni, L; Nomachi, M; Orrell, J L; O'Shaughnessy, C; Overman, N R; Petersburg, R; Phillips, D G; Poon, A W P; Pushkin, K; Radford, D C; Rager, J; Rielage, K; Robertson, R G H; Romero-Romero, E; Ronquest, M C; Shanks, B; Shima, T; Shirchenko, M; Snavely, K J; Snyder, N; Soin, A; Suriano, A M; Tedeschi, D; Thompson, J; Timkin, V; Tornow, W; Trimble, J E; Varner, R L; Vasilyev, S; Vetter, K; Vorren, K; White, B R; Wilkerson, J F; Wiseman, C; Xu, W; Yakushev, E; Young, A R; Yu, C -H; Zhitnikov, I

    2015-01-01

    The Majorana Demonstrator is an ultra-low background physics experiment searching for the neutrinoless double beta decay of $^{76}$Ge. The Majorana Parts Tracking Database is used to record the history of components used in the construction of the Demonstrator. The tracking implementation takes a novel approach based on the schema-free database technology CouchDB. Transportation, storage, and processes undergone by parts such as machining or cleaning are linked to part records. Tracking parts provides a great logistics benefit and an important quality assurance reference during construction. In addition, the location history of parts provides an estimate of their exposure to cosmic radiation. A web application for data entry and a radiation exposure calculator have been developed as tools for achieving the extreme radio-purity required for this rare decay search.

  13. Deep Sky Astronomical Image Database Project at NERSC

    Broader source: All U.S. Department of Energy (DOE) Office Webpages (Extended Search)

    Deep Sky Astronomical Image Database Deep Sky Astronomical Image Database Key Challenges: Develop, store, analyze, and make available an astronomical image database of...

  14. Fact Sheet: Energy Storage Database (October 2012) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Energy Storage Database (October 2012) Fact Sheet: Energy Storage Database (October 2012) DOE and Sandia National Laboratories are developing a database of energy storage projects...

  15. Search Log Analysis of the ARTstor Cultural Heritage Image Database

    E-Print Network [OSTI]

    Lowe, Heather Ann

    2013-01-01

    Patterns in a Digital Image Database. Information RetrievalCultural Heritage Image Database A thesis submitted inCultural Heritage Image Database by Heather Ann Lowe Master

  16. HEXEvent: a database of Human EXon splicing Events

    E-Print Network [OSTI]

    Busch, A.; Hertel, K. J

    2012-01-01

    The UCSC Genome Browser database: extensions and updatesa comparative relational database of alternative splicing.and Transcript Diversity database. Genomics, 93, 213–220.

  17. SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes

    E-Print Network [OSTI]

    Hays, James

    SUN Attribute Database: Discovering, Annotating, and Recognizing Scene Attributes Genevieve attributes. Next, we build the "SUN attribute database" on top of the diverse SUN categorical database. Our

  18. GOLD: The Genomes Online Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Kyrpides, Nikos; Liolios, Dinos; Chen, Amy; Tavernarakis, Nektarios; Hugenholtz, Philip; Markowitz, Victor; Bernal, Alex

    Since its inception in 1997, GOLD has continuously monitored genome sequencing projects worldwide and has provided the community with a unique centralized resource that integrates diverse information related to Archaea, Bacteria, Eukaryotic and more recently Metagenomic sequencing projects. As of September 2007, GOLD recorded 639 completed genome projects. These projects have their complete sequence deposited into the public archival sequence databases such as GenBank EMBL,and DDBJ. From the total of 639 complete and published genome projects as of 9/2007, 527 were bacterial, 47 were archaeal and 65 were eukaryotic. In addition to the complete projects, there were 2158 ongoing sequencing projects. 1328 of those were bacterial, 59 archaeal and 771 eukaryotic projects. Two types of metadata are provided by GOLD: (i) project metadata and (ii) organism/environment metadata. GOLD CARD pages for every project are available from the link of every GOLD_STAMP ID. The information in every one of these pages is organized into three tables: (a) Organism information, (b) Genome project information and (c) External links. [The Genomes On Line Database (GOLD) in 2007: Status of genomic and metagenomic projects and their associated metadata, Konstantinos Liolios, Konstantinos Mavromatis, Nektarios Tavernarakis and Nikos C. Kyrpides, Nucleic Acids Research Advance Access published online on November 2, 2007, Nucleic Acids Research, doi:10.1093/nar/gkm884]

    The basic tables in the GOLD database that can be browsed or searched include the following information:

    • Gold Stamp ID
    • Organism name
    • Domain
    • Links to information sources
    • Size and link to a map, when available
    • Chromosome number, Plas number, and GC content
    • A link for downloading the actual genome data
    • Institution that did the sequencing
    • Funding source
    • Database where information resides
    • Publication status and information

    (Specialized Interface)

  19. INCREMENTAL HORIZONTAL FRAGMENTATION OF DATABASE CLASS OBJECTS

    E-Print Network [OSTI]

    Ezeife, Christie

    INCREMENTAL HORIZONTAL FRAGMENTATION OF DATABASE CLASS OBJECTS C.I. Ezeife School of Computer-orientd databases, Incremental horizontal fragmentation, Distribution Abstract: Horizontal fragments of a class in an object-oriented database system contain subsets of the class extent or instance objects. These fragments

  20. Temporal Databases Status and Research Directions

    E-Print Network [OSTI]

    Snodgrass, Richard T.

    is a personal, subjective, and necessarily incomplete history of the field over the last 4,000 years. I attempt these databases several thousand years and look up the (then current) grain harvest. Oral histories, e.g., Homer transaction time, recording a history of updates made to the database. Such a database supports rollback

  1. Comprehensive Database on Concrete Creep and Shrinkage

    E-Print Network [OSTI]

    ://iti.northwestern.edu. Evolution of Databases A vast number of creep and shrinkage experiments have been carried out aroundComprehensive Database on Concrete Creep and Shrinkage Zdenek P. Bazant and Guang-Hua Li Structural Database on Concrete Creep and Shrinkage Zdenek P. Bazant1 and Guang-Hua Li2 Abstract: As a sequel

  2. Supporting Database Provenance under Schema Evolution

    E-Print Network [OSTI]

    Zaniolo, Carlo

    Supporting Database Provenance under Schema Evolution Shi Gao and Carlo Zaniolo University of California, Los Angeles {gaoshi, zaniolo}@cs.ucla.edu Abstract. Database schema upgrades are common in modern to explain the provenance of contents generated by the database conversion that is part of such upgrades

  3. Answering Historical Queries in Databases using Relevance

    E-Print Network [OSTI]

    Bertossi, Leopoldo

    consider the problem of answering queries about the evolution of the database along a sequence Reiter's proposal [14, 16] to specify the database evolution in the situation calculus, a first.e. in the whole evolution of the database, that a given property holds''? or ``Has a given property been true

  4. Evolution towards, in, and beyond Object Databases

    E-Print Network [OSTI]

    Scholl, Marc H.

    Evolution towards, in, and beyond Object Databases Marc H. Scholl and Markus Tresch Faculty ``evolution'' in the database arena. This paper tries to categorize some of these into a unique framework of evolution that are addressed in the title: -- Evolution towards object databases: Here we address

  5. Database System Concepts Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use ©Silberschatz, Korth and SudarshanDatabase System Concepts Chapter 8: Application Design andChapter 8: Application Design and DevelopmentDevelopment #12;©Silberschatz, Korth and Sudarshan8.2Database

  6. GRAPHDB -a database of Axel Kohnert

    E-Print Network [OSTI]

    Laue, Reinhard

    GRAPHDB - a database of graphs March 2003 Axel Kohnert University of Bayreuth http://btm2xg ADMIN DBUSER ¡£¢ DB ¤ ¥ GRAPHVIEWER ¦ GRAPHSERVER #12;A: The Database Part I. THE MASTER TABLE #12;B: The client access to the database There are several web pages which allow the search

  7. IMPLEMENTING RELATIONSHIPS IN AN OBJECTORIENTED DATABASE

    E-Print Network [OSTI]

    Doherty, Michael

    OF RHODE ISLAND 1992 i #12; Abstract Semantic database models have shown the importance and utility of arbi­ trary user­defined relationships to define the semantics of database information. Object­oriented models on that model. The data definition language is automat­ ically mapped to a database implementation which

  8. Modelling Lexical Databases with Formal Concept Analysis

    E-Print Network [OSTI]

    Priss, Uta

    . The primary lexical database used in this paper is Roget's International Thesaurus [Roget 1962 and formal ontologies. We are using the following relational database versions of Roget's Thesaurus: ­ RIT11: a relational database version of Roget's Thesaurus [Roget 1911] which was compiled by the second author based

  9. Databases

    E-Print Network [OSTI]

    Mcgregor, D.; Cockshott, P.; Wilson, J.; US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press [More Details

    Mcgregor,D. Cockshott,P. Wilson,J. US Patent 6169990 British Patent, Volume BP 9604522.4 Academic Press

  10. Database specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB)

    SciTech Connect (OSTI)

    Faby, E.Z.; Fluker, J.; Hancock, B.R.; Grubb, J.W.; Russell, D.L. [Univ. of Tennessee, Knoxville, TN (United States)] [Univ. of Tennessee, Knoxville, TN (United States); Loftis, J.P.; Shipe, P.C.; Truett, L.F. [Oak Ridge National Lab., TN (United States)] [Oak Ridge National Lab., TN (United States)

    1994-03-01

    This Database Specification for the Worldwide Port System (WPS) Regional Integrated Cargo Database (ICDB) describes the database organization and storage allocation, provides the detailed data model of the logical and physical designs, and provides information for the construction of parts of the database such as tables, data elements, and associated dictionaries and diagrams.

  11. The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation

    E-Print Network [OSTI]

    Busso, Carlos

    The USC CreativeIT Database: A Multimodal Database of Theatrical Improvisation Angeliki Metallinou' creativity. The USC CreativeIT database provides a novel bridge between the study of theatrical improvisation and human expressive behavior in dyadic interaction. The theoretical design of the database is based

  12. NIST Standard Reference Database 1A NIST/EPA/NIH Mass Spectral Database (NIST 11) and

    E-Print Network [OSTI]

    NIST Standard Reference Database 1A NIST/EPA/NIH Mass Spectral Database (NIST 11) and NIST Mass of the Database and to verify that the data contained therein have been selected on the basis of sound scientific that may result from errors or omissions in the Database. © 1987, 1988, 1990, 1992, 1994, 1995, 1996, 1997

  13. Materials Databases Infrastructure Constructed by First Principles Calculations: A Review

    DOE Public Access Gateway for Energy & Science Beta (PAGES Beta)

    Lin, Lianshan

    2015-10-13

    The First Principles calculations, especially the calculation based on High-Throughput Density Functional Theory, have been widely accepted as the major tools in atom scale materials design. The emerging super computers, along with the powerful First Principles calculations, have accumulated hundreds of thousands of crystal and compound records. The exponential growing of computational materials information urges the development of the materials databases, which not only provide unlimited storage for the daily increasing data, but still keep the efficiency in data storage, management, query, presentation and manipulation. This review covers the most cutting edge materials databases in materials design, and their hotmore »applications such as in fuel cells. By comparing the advantages and drawbacks of these high-throughput First Principles materials databases, the optimized computational framework can be identified to fit the needs of fuel cell applications. The further development of high-throughput DFT materials database, which in essence accelerates the materials innovation, is discussed in the summary as well.« less

  14. Geothermal NEPA Database on OpenEI (Poster)

    SciTech Connect (OSTI)

    Young, K. R.; Levine, A.

    2014-09-01

    The National Renewable Energy Laboratory (NREL) developed the Geothermal National Environmental Policy Act (NEPA) Database as a platform for government agencies and industry to access and maintain information related to geothermal NEPA documents. The data were collected to inform analyses of NEPA timelines, and the collected data were made publically available via this tool in case others might find the data useful. NREL staff and contractors collected documents from agency websites, during visits to the two busiest Bureau of Land Management (BLM) field offices for geothermal development, and through email and phone call requests from other BLM field offices. They then entered the information into the database, hosted by Open Energy Information (http://en.openei.org/wiki/RAPID/NEPA). The long-term success of the project will depend on the willingness of federal agencies, industry, and others to populate the database with NEPA and related documents, and to use the data for their own analyses. As the information and capabilities of the database expand, developers and agencies can save time on new NEPA reports by accessing a single location to research related activities, their potential impacts, and previously proposed and imposed mitigation measures. NREL used a wiki platform to allow industry and agencies to maintain the content in the future so that it continues to provide relevant and accurate information to users.

  15. Scalability and Security Conflict for RFID Authentication Protocols

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    chain management and inventory control. Because of low production costs and small size, RFID technology to be the main communication devices in ubiquitous environment with many applications in manufacturing, sup- ply

  16. A DATABASE INTEGRATION SYSTEM BASED ON GLOBAL VIEW GENERATION

    E-Print Network [OSTI]

    Lawrence, Ramon

    A DATABASE INTEGRATION SYSTEM BASED ON GLOBAL VIEW GENERATION Uchang Park Duksung Women: database, integration, view, heterogeneity. Abstract: Database integration is a common and growing challenge with the proliferation of database systems, data warehouses, data marts, and other OLAP systems

  17. This overview covers: Connecting to a Chado Database

    E-Print Network [OSTI]

    Maizels, Rick

    This overview covers: · Connecting to a Chado Database · Reading From the Database · iBatis Database Mapping · Gene Representation · Gene Building · Gene merging and splitting · Transfer Annotation Tool · Writing To The Database · Opening the Standalone Gene Builder · Community Annotation · Writing

  18. Enhancing the DNA Patent Database

    SciTech Connect (OSTI)

    Walters, LeRoy B.

    2008-02-18

    Final Report on Award No. DE-FG0201ER63171 Principal Investigator: LeRoy B. Walters February 18, 2008 This project successfully completed its goal of surveying and reporting on the DNA patenting and licensing policies at 30 major U.S. academic institutions. The report of survey results was published in the January 2006 issue of Nature Biotechnology under the title “The Licensing of DNA Patents by US Academic Institutions: An Empirical Survey.” Lori Pressman was the lead author on this feature article. A PDF reprint of the article will be submitted to our Program Officer under separate cover. The project team has continued to update the DNA Patent Database on a weekly basis since the conclusion of the project. The database can be accessed at dnapatents.georgetown.edu. This database provides a valuable research tool for academic researchers, policymakers, and citizens. A report entitled Reaping the Benefits of Genomic and Proteomic Research: Intellectual Property Rights, Innovation, and Public Health was published in 2006 by the Committee on Intellectual Property Rights in Genomic and Protein Research and Innovation, Board on Science, Technology, and Economic Policy at the National Academies. The report was edited by Stephen A. Merrill and Anne-Marie Mazza. This report employed and then adapted the methodology developed by our research project and quoted our findings at several points. (The full report can be viewed online at the following URL: http://www.nap.edu/openbook.php?record_id=11487&page=R1). My colleagues and I are grateful for the research support of the ELSI program at the U.S. Department of Energy.

  19. On Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovic

    E-Print Network [OSTI]

    Cipolla, Roberto

    . This is due to the fact that a thermal infrared sensor measures the heat energy radiation emitted by the faceOn Person Authentication by Fusing Visual and Thermal Face Biometrics Ognjen Arandjelovi´c Riad in the thermal spectrum are promising in achieving invariance to extreme illumination changes that are often

  20. Efficient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef- ficient than

  1. E#cient Compilers for Authenticated Group Key Qiang Tang and Chris J. Mitchell

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    E#cient Compilers for Authenticated Group Key Exchange Qiang Tang and Chris J. Mitchell Information.tang,c.mitchell}@rhul.ac.uk 10th October, 2005 Abstract In this paper we propose two compilers which are designed to transform, or malicious insider. We show that the first proposed compiler gives protocols that are more ef­ ficient than

  2. Time Valid One-Time Signature for Time-Critical Multicast Data Authentication

    E-Print Network [OSTI]

    Nahrstedt, Klara

    malicious attacks. In this paper, we propose a novel signature model ­ Time Valid One-Time Signature (TVTime Valid One-Time Signature for Time-Critical Multicast Data Authentication Qiyan Wang, Himanshu-OTS) ­ to boost the efficiency of regular one-time signature schemes. Based on the TV-OTS model, we design

  3. RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot

    E-Print Network [OSTI]

    Rajpoot, Nasir

    RADON/RIDGELET SIGNATURE FOR IMAGE AUTHENTICATION Zhen Yao Nasir Rajpoot Dept. of Computer Science transform. The signature is extracted from the Radon domain and entropy coded after a 1D wavelet transform- derlying Radon transform plays an essential role in provid- ing such non-separable, directional properties

  4. Nov. 15, 2001 Mohammad al-Kahtani 1 Emerging Authorization and Authentication

    E-Print Network [OSTI]

    Sandhu, Ravi

    1 Nov. 15, 2001 Mohammad al-Kahtani 1 XML Emerging Authorization and Authentication Standards Nov. 15, 2001 Mohammad al-Kahtani 2 About the speaker · Name: Mohammad al-Kahtani · Doctoral Candidate in Software Engineering: George Mason University · Contact info: malkahta@gmu.edu #12;2 Nov. 15, 2001 Mohammad

  5. Cryptanalysis of an IDbased Password Authentication Scheme using Smart Cards and

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Cryptanalysis of an ID­based Password Authentication Scheme using Smart Cards and Fingerprints Michael Scott School of Computer Applications Dublin City University Ballymun, Dublin 9, Ireland. mike two ID­based password authen­ tication schemes for logging onto a remote network server using smart

  6. A Secure and efficient elliptic curve based authentication and key agreement protocol suitable for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    for WSN Majid Bayat bayat@khu.ac.ir Department of Mathematical Sciences and Computer, University protocols for WSN which in this paper we show that the protocol has some security flaws. Also we introduce an enhanced authentication and key agreement protocol for WSN satisfying all the security requirements

  7. On the (in)security of some smart-card-based password authentication schemes for WSN

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    On the (in)security of some smart-card-based password authentication schemes for WSN Ding Wang1 operations and thus is suitable for the resource-constrained WSN environments where an external user wants-tamper-resistant smart cards for WSN. We hope that, by following this principle, similar mistakes repeated in the past

  8. April 11, 2002 Computer Security Foundations Workshop 1 Security Protocol Design via Authentication Tests

    E-Print Network [OSTI]

    Guttman, Joshua

    process, and illustrate its use by creating ATSPECT, an Authentication Test-based Se- cure Protocol a basis for secure electronic commerce. It is not currently in use anywhere, presumably partly it was viewed as a high-risk un- Supported by the National Security Agency through US Army CE- COM contract DAAB

  9. Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Authenticated Wireless Roaming via Tunnels: Making Mobile Guests Feel at Home Mark Manulis1|francois.koeune|olivier.bonaventure|jean-jacques.quisquater}@uclouvain.be Abstract. In wireless roaming a mobile device obtains a service from some foreign network while being. Such Wireless Roaming via Tunnels (WRT) offers several (security) benefits but states also new security

  10. A Lightweight Certificate-based Source Authentication Protocol for Group Communication

    E-Print Network [OSTI]

    Baras, John S.

    of lightweight, symmetric-key certificates called TESLA certificate. The certificates bind the identities and verification frequently can prevent the CPU from other functions and drain the battery quickly. Therefore resources. We propose to achieve authentication using a new class of certificates called TESLA Certificate

  11. Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location

    E-Print Network [OSTI]

    Ottawa, University of

    18 Robust Content-Based MPEG-4 XMT Scene Structure Authentication and Multimedia Content Location-based MPEG-4 XMT standard. XMT allows content authors to exchange their content with other authors, tools-4 XMT structure and its media content. Unlike images or videos, watermarking an XMT structure

  12. All Your Face Are Belong to Us: Breaking Facebook's Social Authentication

    E-Print Network [OSTI]

    Keromytis, Angelos D.

    All Your Face Are Belong to Us: Breaking Facebook's Social Authentication Iasonas Polakis FORTH adversaries from compromising accounts using stolen credentials. Facebook has recently released a two can obtain the information needed to solve the chal- lenges presented by Facebook. We implement

  13. Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation

    E-Print Network [OSTI]

    Bicego, Manuele

    Distance Measures for Gabor Jets-Based Face Authentication: A Comparative Evaluation Daniel Gonz (Italy) tista@uniss.it Abstract. Local Gabor features (jets) have been widely used in face recognition systems. Once the sets of jets have been extracted from the two faces to be compared, a proper measure

  14. V-174: RSA Authentication Manager Writes Operating System, SNMP, and HTTP

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConduct Cross-Site Scripting

  15. V-195: RSA Authentication Manager Lets Local Users View the Administrative

    Broader source: Energy.gov (indexed) [DOE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirleyEnergyThe U.S.Lacledeutilities. The Economics ofConductMultipleAccount Password |

  16. U-084: Cisco Digital Media Manager Lets Remote Authenticated Users Gain

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious RankADVANCEDInstallers/ContractorsPhotovoltaicsStateof Energy TwoEvent at theArbitrary Code |

  17. U-212: RSA Authentication Manager Flaws Permit Cross-Site and Cross-Frame

    Office of Environmental Management (EM)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Homesum_a_epg0_fpd_mmcf_m.xls" ,"Available from WebQuantity of Natural GasAdjustmentsShirley Ann Jackson About1996HowFOAShowing YouNeed forUnruhDepartment ofM I C HCommandsEnergy

  18. IDENTITY AND ACCESS MANAGEMENT -GOVERNANCE AND POLICY FOCUS GROUP POLICY GAP ANALYSIS

    E-Print Network [OSTI]

    Maroncelli, Mark

    and ITS policies including this policy. Written Acknowledgment includes image data base form from the PennIDENTITY AND ACCESS MANAGEMENT - GOVERNANCE AND POLICY FOCUS GROUP POLICY GAP ANALYSIS Issue Policy systems that use this Userid for authentication and authorization. Life Cycle-Affiliations Definition

  19. The Dartmouth Stellar Evolution Database

    E-Print Network [OSTI]

    Aaron Dotter; Brian Chaboyer; Darko Jevremovic; Veselin Kostov; E. Baron; J. W. Ferguson

    2008-04-28

    The ever-expanding depth and quality of photometric and spectroscopic observations of stellar populations increase the need for theoretical models in regions of age-composition parameter space that are largely unexplored at present. Stellar evolution models that employ the most advanced physics and cover a wide range of compositions are needed to extract the most information from current observations of both resolved and unresolved stellar populations. The Dartmouth Stellar Evolution Database is a collection of stellar evolution tracks and isochrones that spans a range of [Fe/H] from -2.5 to +0.5, [alpha/Fe] from -0.2 to +0.8 (for [Fe/H] 0), and initial He mass fractions from Y=0.245 to 0.40. Stellar evolution tracks were computed for masses between 0.1 and 4 Msun, allowing isochrones to be generated for ages as young as 250 Myr. For the range in masses where the core He flash occurs, separate He-burning tracks were computed starting from the zero age horizontal branch. The tracks and isochrones have been transformed to the observational plane in a variety of photometric systems including standard UBV(RI)c, Stromgren uvby, SDSS ugriz, 2MASS JHKs, and HST ACS-WFC and WFPC2. The Dartmouth Stellar Evolution Database is accessible through a website at http://stellar.dartmouth.edu/~models/ where all tracks, isochrones, and additional files can be downloaded.

  20. Data Management Guide: Integrated Baseline System (IBS). Version 2.1

    SciTech Connect (OSTI)

    Bower, J.C. [Bower Software Services, Kennewick, Washington (United States)] Bower Software Services, Kennewick, Washington (United States); Burford, M.J.; Downing, T.R.; Moise, M.C.; Williams, J.R. [Pacific Northwest Lab., Richland, WA (United States)] Pacific Northwest Lab., Richland, WA (United States)

    1995-01-01

    The Integrated Baseline System (IBS) is an emergency management planning and analysis tool that is being developed under the direction of the US Army Nuclear and Chemical Agency (USANCA). The IBS Data Management Guide provides the background, as well as the operations and procedures needed to generate and maintain a site-specific map database. Data and system managers use this guide to manage the data files and database that support the administrative, user-environment, database management, and operational capabilities of the IBS. This document provides a description of the data files and structures necessary for running the IBS software and using the site map database.

  1. National Residential Efficiency Measures Database Unveiled (text...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    technical activities, including the database project we're discussing today and the BEopt software development efforts. During today's webinar, Dave will outline the current...

  2. Transmission/Nepa Database | Open Energy Information

    Open Energy Info (EERE)

    Nepa Database < Transmission Jump to: navigation, search NepaHeader.png Transmission Dashboard Permitting Atlas Compare States Arizona California Colorado Idaho Montana Nevada New...

  3. A Database Index to Large Biological Sequences

    E-Print Network [OSTI]

    Hunt, E.

    Hunt,E. Atkinson,M.P. Irving,R.W. Proceedings of the 27th Conference on Very Large Databases pp 139-148 Morgan Kaufmann

  4. National Residential Efficiency Measures Database Webinar Slides...

    Energy Savers [EERE]

    binar20100324openpvquniby.pdf Solar Energy - Capturing and Using Power and Heat from the Sun Building America Webinar: National Residential Efficiency Measures Database Unveiled...

  5. Basic energy properties of electrolytic solutions database. ...

    Office of Scientific and Technical Information (OSTI)

    Basic energy properties of electrolytic solutions database. Viscosity, thermal conductivity, density, enthalpy Citation Details In-Document Search Title: Basic energy properties...

  6. HANFORD NUCLEAR CRITICALITY SAFETY PROGRAM DATABASE

    SciTech Connect (OSTI)

    TOFFER, H.

    2005-05-02

    The Hanford Database is a useful information retrieval tool for a criticality safety practitioner. The database contains nuclear criticality literature screened for parameter studies. The entries, characterized with a value index, are segregated into 16 major and six minor categories. A majority of the screened entries have abstracts and a limited number are connected to the Office of Scientific and Technology Information (OSTI) database of full-size documents. Simple and complex searches of the data can be accomplished very rapidly and the end-product of the searches could be a full-size document. The paper contains a description of the database, user instructions, and a number of examples.

  7. Sandia Wind Turbine Loads Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The Sandia Wind Turbine Loads Database is divided into six files, each corresponding to approximately 16 years of simulation. The files are text files with data in columnar format. The 424MB zipped file containing six data files can be downloaded by the public. The files simulate 10-minute maximum loads for the NREL 5MW wind turbine. The details of the loads simulations can be found in the paper: “Decades of Wind Turbine Loads Simulations”, M. Barone, J. Paquette, B. Resor, and L. Manuel, AIAA2012-1288 (3.69MB PDF). Note that the site-average wind speed is 10 m/s (class I-B), not the 8.5 m/s reported in the paper.

  8. Catalog of databases and reports

    SciTech Connect (OSTI)

    Burtis, M.D.

    1997-04-01

    This catalog provides information about the many reports and materials made available by the US Department of Energy`s (DOE`s) Global Change Research Program (GCRP) and the Carbon Dioxide Information Analysis Center (CDIAC). The catalog is divided into nine sections plus the author and title indexes: Section A--US Department of Energy Global Change Research Program Research Plans and Summaries; Section B--US Department of Energy Global Change Research Program Technical Reports; Section C--US Department of Energy Atmospheric Radiation Measurement (ARM) Program Reports; Section D--Other US Department of Energy Reports; Section E--CDIAC Reports; Section F--CDIAC Numeric Data and Computer Model Distribution; Section G--Other Databases Distributed by CDIAC; Section H--US Department of Agriculture Reports on Response of Vegetation to Carbon Dioxide; and Section I--Other Publications.

  9. A procedure for automatically linking a geographical database and a pavement attribute database 

    E-Print Network [OSTI]

    Lehmann, Erwin August

    1996-01-01

    operational PMS packages display information in a tabular format, a Geographical Information System (GIS) displays information graphically. Therefore, linking a PMS attribute database to a GIS spatial database can improve and enhance its functionality...

  10. Parallel Database Systems: The Future of High Performance Database Processing1

    E-Print Network [OSTI]

    Cafarella, Michael J.

    . 94105-2403 dewitt @ cs.wisc.edu Gray @ SFbay.enet.dec.com January 1992 Abstract: Parallel database

  11. Wyoming Interagency Spatial Database & Online Management | Open Energy

    Open Energy Info (EERE)

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page| Open Energy Information Serbia-EnhancingEtGeorgia:Illinois:Wizard PowerWyandanch, New York:-26State Parks

  12. Managing Schema Changes in ObjectRelationship Databases ?

    E-Print Network [OSTI]

    Boudjlida, Nacer

    data schema versions is also needed. For these rea­ sons, support for full schema evolution is a required facility in any DB system. Full schema evolution concerns schema change or modiøcation, instance deønes the facet mechanism and shows its use in schema evolution. We end the paper by implementation

  13. Museums and Online Archives Collaboration Digital Asset Management Database

    E-Print Network [OSTI]

    California at Berkeley, University of

    , labor, and technical capacity limit the ability of museums and libraries to share digital content://bampfa.berkeley.edu/moac. Project Goals & Objectives * Enhance interoperability, integration, and seamless access to digital library and libraries wishing to share digital content in standards-based, national-level, content gateway projects

  14. MIS 325: Database Management Room: UTC 1.146

    E-Print Network [OSTI]

    Ghosh, Joydeep

    : 471-9436 Teaching Assistants Alysha Chamadia Jenny Tseng Hours and location to be announced Course.g., new product introduction, plant expansion, off-shoring, downsizing, stock offerings). Without a well academic accommodations for qualified students with disabilities. For more information, contact the Office

  15. V-036: EMC Smarts Network Configuration Manager Database Authenticatio...

    Office of Environmental Management (EM)

    can obtain passwords. Solution: The vendor has issued a fix (9.1). This fix also includes security updates for Apache Tomcat and JBOSS. Addthis Related Articles V-120: EMC Smarts...

  16. Moving Objects Information Management: The Database (Vision Paper)

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    applications, dramatically improving the accuracy of GPS-based location data to 5-50 meters. As prices of basic enabling equipment like smart cell phones, hand helds, wireless modems, and GPS devices and services, ATM machines, or gas stations. Analyses Ltd. estimates that location based services will generate $18

  17. Comp 5311 Database Management Systems 8. Indexing Exercises

    E-Print Network [OSTI]

    Papadias, Dimitris

    ] Assuming that the Film relation is sorted on the Title and there is no index what is the cost (in terms for these entries, and what is the cost of retrieving the record of an employee with a given eid: index entry size = 10 bytes, 100 entries per page, 1,000 pages for the index, cost: log21000+1 Indexing Problem 2 (cont

  18. Micro-Specialization: Dynamic Code Specialization of Database Management Systems

    E-Print Network [OSTI]

    Debray, Saumya

    performance. Much of the work to date on optimizing DBMS performance has emphasized ensuring efficient data to a particular kind of invariant. We realize these techniques, in concert termed micro-specialization, via a DBMS-independent run-time environment and apply them to a high- performance open-source DBMS, PostgreSQL. We show

  19. Journal of Database Management Oct-Dec. 1999

    E-Print Network [OSTI]

    Balaban, Mira

    routinesmaybeimplementedasdatabaseprocedures,ifarelationalDBMSisutilized,orasclassmethods,ifanobject- oriented DBMS is utilized. INTRODUCTION, and implemented with some specific DBMS, using its specific DDL (data definition language).Applicationprogramsthatmanipulatethedatabase access the DBMS via its DML (data manipulation language), either directly or through a host programming

  20. T-614: Cisco Unified Communications Manager Database Security Vulnerability

    Energy Savers [EERE]

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on QA:QA J-E-1 SECTION J APPENDIX E LIST OF APPLICABLEStatutory Authority SustainXSystem for Award35:Department|

  1. EERE Project Management Center Database PIA, The Office of Energy

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    AFDC Printable Version Share this resource Send a link to EERE: Alternative Fuels Data Center Home Page to someone by E-mail Share EERE: Alternative Fuels Data Center Home Page on Facebook Tweet about EERE: Alternative Fuels Data Center Home Page on Twitter Bookmark EERE: Alternative Fuels Data Center Home Page on Google Bookmark EERE: Alternative Fuels Data Center Home Page on Delicious Rank EERE: Alternative Fuels DataEnergy Webinar:IAboutReuben Sarkar, DeputyDepartment ofO

  2. Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific

    E-Print Network [OSTI]

    Ohta, Shigemi

    Nuclear Databases: National Resource Nuclear databases consists of carefully organized scientific information that has been gathered over 50 years of low-energy nuclear physics research worldwide. These powerful databases have enormous value and they represent a genuine national resource. Six core nuclear

  3. Evolution of the use of relational and NoSQL databases in the ATLAS experiment

    E-Print Network [OSTI]

    Barberis, Dario; The ATLAS collaboration

    2015-01-01

    The ATLAS experiment used for many years a large database infrastructure based on Oracle to store several different types of non-event data: time-dependent detector configuration and conditions data, calibrations and alignments, configurations of Grid sites, catalogues for data management tools, job records for distributed workload management tools, run and event metadata. The rapid development of “NoSQL” databases (structured storage services) in the last five years allowed an extended and complementary usage of traditional relational databases and new structured storage tools in order to improve the performance of existing applications and to extend their functionalities using the possibilities offered by the modern storage systems. The trend is towards using the best tool for each kind of data, separating for example the intrinsically relational metadata from payload storage, and records that are frequently updated and benefit from transactions from archived information. Access to all components has to...

  4. 1 Files and Databases mass storage

    E-Print Network [OSTI]

    Verschelde, Jan

    Outline 1 Files and Databases mass storage hash functions 2 Dictionaries logical key values nested Jan Verschelde, 28 January 2015 Intro to Computer Science (MCS 260) mass storage and dictionaries L-7 28 January 2015 1 / 32 #12;mass storage dictionaries in Python 1 Files and Databases mass storage

  5. Quantum search of an unstructured database

    E-Print Network [OSTI]

    Bogus?aw Broda

    2015-07-10

    A simple model of circuit implementation of the standard Grover algorithm for quantum search of an unstructured real classical database is proposed. The Grover iteration utilizes an appropriately defined oracle, which contains a kind of quantumly accessible classical memory storing the database.

  6. Novanet Libcasts BASIC Searching an EBSCO database

    E-Print Network [OSTI]

    Brownstone, Rob

    interface. Dal Libraries Database Search Screen with PsycINFO as search term. Click search. Open Database First let's consider our search terms. In advanced search you can combine search words in a variety some terms. TV, violence and children are three terms we can use to begin our search. Place an asterisk

  7. Publication Kind Codes in STN Patent Databases

    E-Print Network [OSTI]

    Hoffmann, Armin

    Publication Kind Codes in STN Patent Databases Dokumentenart-Codes in STN-Patentdatenbanken Imprint Abstracts (CAPLUS), Chemical Abstracts (CAPLUS), Derwent World Patents Index (DWPI), and Derwent World Patents Index (DWPI)und INPADOCDB INPADOCDB international patent databases, together with a short

  8. DATA QUALITY IN GENOME DATABASES (Research Paper)

    E-Print Network [OSTI]

    Freytag, Johann-Christoph

    DATA QUALITY IN GENOME DATABASES (Research Paper) Heiko MĂĽller Humboldt University Berlin, Germany@dbis.informatik.hu-berlin.de Abstract: Genome databases store data about molecular biological entities such as genes, proteins, diseases is their importance in the process of drug discovery. Genome data is analyzed and interpreted to gain so-called leads

  9. DISTRIBUTED DATABASE SYSTEMS M. Tamer zsu

    E-Print Network [OSTI]

    Özsu, M. Tamer

    a database that is distributed across the nodes of a computer network and makes this distribution transparent of consistent and atomic execution against the database. Transparency: Extension of data independence at every site where it executes. The name comes from the fact that two rounds of messages are exchanged

  10. Quantifying the consistency of scientific databases

    E-Print Network [OSTI]

    Šubelj, Lovro; Boshkoska, Biljana Mileva; Kastrin, Andrej; Levnaji?, Zoran

    2015-01-01

    Science is a social process with far-reaching impact on our modern society. In the recent years, for the first time we are able to scientifically study the science itself. This is enabled by massive amounts of data on scientific publications that is increasingly becoming available. The data is contained in several databases such as Web of Science or PubMed, maintained by various public and private entities. Unfortunately, these databases are not always consistent, which considerably hinders this study. Relying on the powerful framework of complex networks, we conduct a systematic analysis of the consistency among six major scientific databases. We found that identifying a single "best" database is far from easy. Nevertheless, our results indicate appreciable differences in mutual consistency of different databases, which we interpret as recipes for future bibliometric studies.

  11. To Appear in ACM SIGMOD Record December 2005 From Databases to Dataspaces

    E-Print Network [OSTI]

    Halevy, Alon

    A Database Management System (DBMS) is a generic repository for the storage and querying of structured data. A DBMS offers a suite of interrelated services and guarantees that enables developers to focus today it is rarely the case that all the data can be fit nicely into a conventional re- lational DBMS

  12. Improving Mobile Database Access Over Wide-Area Networks Without Degrading Consistency

    E-Print Network [OSTI]

    Satyanarayanan, Mahadev "Satya"

    degrading consistency. Cedar exploits the disk storage and processing power of a mobile client to compensate to reduce data transmission volume from a data- base server. The reduction is achieved by using content Management]: Systems General Terms Design, Performance Keywords mobile database access, wireless networks

  13. Building test cases and oracles to automate the testing of web database applications Lihua Ran a

    E-Print Network [OSTI]

    Bryce, Renee

    Article history: Received 24 May 2006 Received in revised form 2 May 2008 Accepted 26 May 2008 Available for assuring the correctness of the interactions be- tween a database management system (DBMS) and a web structures implemented in a DBMS work efficiently and protect the integrity of the data [33,34]. Given

  14. Geographically-Distributed Databases: A Big Data Technology for Production Analysis in the Oil & Gas Industry

    E-Print Network [OSTI]

    SPE 167844 Geographically-Distributed Databases: A Big Data Technology for Production Analysis advances in the scientific field of "big-data" to the world of Oil & Gas upstream industry. These off-of-the-start IT technologies currently employed in the data management of Oil & Gas production operations. Most current

  15. Development of specialized electronic bibliographic databases for deep ocean hydrocarbon production and transportation 

    E-Print Network [OSTI]

    Mahendran, Joseph Anthony

    1992-01-01

    information in a manageable form. The developed specialized bibliographic databases contain information located under different headings and present the information under those particular headings chronologically. Subjects include oil spills of various... origins; geological hazards; naturally occurring hydrocarbon seeps; fates and effects of oil spills; major results of pertinent engineering, physical, chemical, ecological, geophysical studies, and satellite oceanographic research. A microcomputer...

  16. Feedback-based Scheduling for Back-end Databases in Shared Dynamic Content Server Clusters

    E-Print Network [OSTI]

    Goel, Ashvin

    servers. We use a unified approach to load and fault manage- ment based on dynamic data replication techniques provide quality of service under load bursts and failure scenarios. 1 Key Contributions This paper This paper introduces a self-configuring architecture for scaling the database tier of dynamic content web

  17. COMET: A Component-Based Real-Time Database for Automotive Systems Dag Nystrom

    E-Print Network [OSTI]

    COMET: A Component-Based Real-Time Database for Automotive Systems Dag Nystr¨om , Aleksandra With the increase of complexity in automotive control systems, the amount of data that needs to be managed is also-constrained automotive control systems, denoted the COMET development suit. Using software engineer- ing tools to assist

  18. To appear: Proceedings 2002 National Conference on Beach Preservation Technology, FSBPA. FEDERAL INLETS DATABASE

    E-Print Network [OSTI]

    US Army Corps of Engineers

    To appear: Proceedings 2002 National Conference on Beach Preservation Technology, FSBPA. FEDERAL and unpublished knowledge of specific inlets in the United States. INTRODUCTION The U.S. Army Corps of Engineers to fully populate it. The Federal Inlets Database will 1) Applied Technology and Management, Inc., 2770 NW

  19. Provably-Secure Authenticated Group Diffie-Hellman KeyExchange

    SciTech Connect (OSTI)

    Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David

    2007-01-01

    Authenticated key exchange protocols allow two participantsA and B, communicating over a public network and each holding anauthentication means, to exchange a shared secret value. Methods designedto deal with this cryptographic problem ensure A (resp. B) that no otherparticipants aside from B (resp. A) can learn any information about theagreed value, and often also ensure A and B that their respective partnerhas actually computed this value. A natural extension to thiscryptographic method is to consider a pool of participants exchanging ashared secret value and to provide a formal treatment for it. Startingfrom the famous 2-party Diffie-Hellman (DH) key exchange protocol, andfrom its authenticated variants, security experts have extended it to themulti-party setting for over a decade and completed a formal analysis inthe framework of modern cryptography in the past few years. The presentpaper synthesizes this body of work on the provably-secure authenticatedgroup DH key exchange.

  20. Delivering Document Management Systems Through the ASP Model

    E-Print Network [OSTI]

    Furht, Borko

    -the-shelf software products that complement Database Management Systems (DBMS). DBMS typically store structured data systems store, retrieve, and manage unstructured data, such as files, text, spreadsheets, images, sound Management Systems The traditional approach in document management systems is based on the client

  1. Ris-R-1301(EN) Database on Wind Characteristics

    E-Print Network [OSTI]

    Risř-R-1301(EN) Database on Wind Characteristics Contents of Database Bank Gunner C. Larsen Risř XVII, Database on Wind Characteristics - Contents of the database Abstract The main objective of IEA R&D Wind Annex XVII - Database on Wind Characteristics - is to provide wind energy planners and designers

  2. An Approach to Evolving Database Dependent Systems (Extended Abstract)

    E-Print Network [OSTI]

    Perry, Dewayne E.

    -58113-545 -9/02/05...$5.00 ficient and slow evolution of database schemas and software that uses the databasesAn Approach to Evolving Database Dependent Systems (Extended Abstract) Mark Grechanika to relational databases using such standards as Universal Data Access (UDA) and Open Database Connec~vity (ODBC

  3. VDBL (Vienna Database Library) Version 1.0

    E-Print Network [OSTI]

    Schichl, Hermann

    VDBL (Vienna Database Library) Version 1.0 Reference Manual Hermann Schichl University of Vienna #12;CONTENTS 1 Contents 1 Introduction 1 2 Vienna Database Library Module Index 3 3 Vienna Database Library Hierarchical Index 3 4 Vienna Database Library Compound Index 6 5 Vienna Database Library File

  4. National Spill Test Technology Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Sheesley, David [Western Research Institute

    Western Research Institute established, and ACRC continues to maintain, the National Spill Technology database to provide support to the Liquified Gaseous Fuels Spill Test Facility (now called the National HAZMAT Spill Center) as directed by Congress in Section 118(n) of the Superfund Amendments and Reauthorization Act of 1986 (SARA). The Albany County Research Corporation (ACRC) was established to make publicly funded data developed from research projects available to benefit public safety. The founders since 1987 have been investigating the behavior of toxic chemicals that are deliberately or accidentally spilled, educating emergency response organizations, and maintaining funding to conduct the research at the DOEĆs HAZMAT Spill Center (HSC) located on the Nevada Test Site. ACRC also supports DOE in collaborative research and development efforts mandated by Congress in the Clean Air Act Amendments. The data files are results of spill tests conducted at various times by the Silicones Environmental Health and Safety Council (SEHSC) and DOE, ANSUL, Dow Chemical, the Center for Chemical Process Safety (CCPS) and DOE, Lawrence Livermore National Laboratory (LLNL), OSHA, and DOT; DuPont, and the Western Research Institute (WRI), Desert Research Institute (DRI), and EPA. Each test data page contains one executable file for each test in the test series as well as a file named DOC.EXE that contains information documenting the test series. These executable files are actually self-extracting zip files that, when executed, create one or more comma separated value (CSV) text files containing the actual test data or other test information.

  5. BDDR, a new CEA technological and operating reactor database

    SciTech Connect (OSTI)

    Soldevilla, M.; Salmons, S.; Espinosa, B.

    2013-07-01

    The new application BDDR (Reactor database) has been developed at CEA in order to manage nuclear reactors technological and operating data. This application is a knowledge management tool which meets several internal needs: -) to facilitate scenario studies for any set of reactors, e.g. non-proliferation assessments; -) to make core physics studies easier, whatever the reactor design (PWR-Pressurized Water Reactor-, BWR-Boiling Water Reactor-, MAGNOX- Magnesium Oxide reactor-, CANDU - CANada Deuterium Uranium-, FBR - Fast Breeder Reactor -, etc.); -) to preserve the technological data of all reactors (past and present, power generating or experimental, naval propulsion,...) in a unique repository. Within the application database are enclosed location data and operating history data as well as a tree-like structure containing numerous technological data. These data address all kinds of reactors features and components. A few neutronics data are also included (neutrons fluxes). The BDDR application is based on open-source technologies and thin client/server architecture. The software architecture has been made flexible enough to allow for any change. (authors)

  6. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Network management and QoS provisioning - 1Andrea of this license visit: http://creativecommons.org/licenses/by-nc- /3 0/ Network management and QoS provisioning ­ Chapter 9, Network Management, of the book Jim Kurose, Keith Ross, Computer Networking, A Top Down

  7. Management Plan Management Plan

    E-Print Network [OSTI]

    Management Plan Management Plan "Management and restoration programs for native salmonids have communities" J. Lichatowich et al. 1998. A Conceptual Foundation for the Management of Native Salmonids in the Deschutes River. The Management Plan consists of five elements described in the Council's program: 1

  8. SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bdard, Suzie Larrive

    E-Print Network [OSTI]

    SPATIAL DATABASE MODELING WITH PICTOGRAMMIC LANGUAGES Yvan Bédard, Suzie Larrivée Dept of Geomatics Sciences Centre for Research in Geomatics Canada NSERC Industrial Research Chair in Geospatial Databases language extension, Spatial data modeling, Perceptory pictograms. DEFINITION "Spatial databases" consist

  9. The volatile compound BinBase mass spectral database

    E-Print Network [OSTI]

    Skogerson, Kirsten; Wohlgemuth, Gert; Barupal, Dinesh K; Fiehn, Oliver

    2011-01-01

    B, Eriksson R: SuperScent-a database of flavors and scents.Sayaed AM: The Pherobase: Database of Insect Pheromones andA public study design database for metabolomics projects.

  10. DATE A DAtabase of TIM Barrel 2.1 Introduction......................................................................................

    E-Print Network [OSTI]

    Babu, M. Madan

    24 DATE ­ A DAtabase of TIM Barrel Enzymes 2.1 Introduction...................................................................................... 2.2 Objective and salient features of the database .................................... 2.2.1 Choice on the database............................................... 2.4 Features

  11. Unit 10 - Spatial Databases as Models of Reality

    E-Print Network [OSTI]

    Unit 10, CC in GIS; Nyerges, Timothy L.

    1990-01-01

    data. 4. What is a database model, and why is it importantAttributes Attribute value Database model Layers D. DATABASEnot an official DCDSTF term Database model is a conceptual

  12. Heat Flow Database Expansion for NGDS Data Development, Collection...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU) Heat Flow Database Expansion for NGDS Data Development, Collection and Maintenance (SMU)...

  13. Motivate Homeowner Action With Updated DOE Incentives Database...

    Energy Savers [EERE]

    Database Motivate Homeowner Action With Updated DOE Incentives Database Is customer motivation a barrier to marketing upgrades in your community? You can find ideas for incentives...

  14. DOE Facility Database - Datasets - OpenEI Datasets

    Open Energy Info (EERE)

    DOE Facility Database Data and Resources DOE Facility DatabaseCSV Preview Download Research and Develo... User Facilities Additional Info Field Value Author U.S. Office of...

  15. Standard Energy Efficiency Database Platform - 2013 BTO Peer...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    Database Platform - 2013 BTO Peer Review Standard Energy Efficiency Database Platform - 2013 BTO Peer Review commlbldgs09prindle040313.pdf More Documents & Publications Buildings...

  16. It's All About the Data: How the Building Performance Database...

    Energy Savers [EERE]

    the Data: How the Building Performance Database is Informing Decisions on Energy Efficiency It's All About the Data: How the Building Performance Database is Informing...

  17. Fault-tolerant distributed transactions for partitioned OLTP databases

    E-Print Network [OSTI]

    Jones, Evan P. C. (Evan Philip Charles), 1981-

    2012-01-01

    This thesis presents Dtxn, a fault-tolerant distributed transaction system designed specifically for building online transaction processing (OLTP) databases. Databases have traditionally been designed as general purpose ...

  18. A Welsh speech database: preliminary results. 

    E-Print Network [OSTI]

    Williams, Briony

    1999-01-01

    A speech database for Welsh was recorded in a studio from read text by a few speakers. The purpose is to investigate the acoustic characteristics of Welsh speech sounds and prosody. It can also serve as a resource ...

  19. Deductive Databases: Achievements and Future Directions

    E-Print Network [OSTI]

    Zaniolo, Carlo

    demands that are not answered by conventional DBMS, such as the following: · The need to deal wigh complex to examine a database of medical histories to test a variety of hypotheses about possible causes of diseases

  20. A database of circumstellar OH masers

    E-Print Network [OSTI]

    Engels, D

    2015-01-01

    We present a new database of circumstellar OH masers at 1612, 1665, and 1667 MHz in the Milky Way galaxy. The database (version 2.4) contains 13655 observations and 2341 different stars detected in at least one transition. Detections at 1612\\,MHz are considered to be complete until the end of 2014 as long as they were published in refereed papers. Detections of the main lines (1665 and 1667 MHz) and non-detections in all transitions are included only if published after 1983. The database contains flux densities and velocities of the two strongest maser peaks, the expansion velocity of the shell, and the radial velocity of the star. Links are provided for about 100 stars ($database is possible over the Web (www.hs.uni-hamburg.de/maserdb), allowing cone searches for individual sources and lists of sources. A general search is possible in...

  1. Enabling Geographical Queries to a Botanical Database 

    E-Print Network [OSTI]

    Sato, Go

    2011-11-25

    Conservation of the lowland savanna ecosystem in Belize Project (Defra 17-022) has created a database of savanna plant collections in the country. Some of the collections have accurate positional coordinates measured by GPS devices while the others...

  2. Energy Citations Database (ECD) - Alerts Comments

    Office of Scientific and Technical Information (OSTI)

    Alerts Comments If you have a question about Energy Citations Database Alerts, we recommend you check frequently asked questions. If your question still has not been answered or if...

  3. Proposal for a High Energy Nuclear Database

    E-Print Network [OSTI]

    Brown, David A.; Vogt, Ramona

    2005-01-01

    Proposal for a High Energy Nuclear Database David A. Brown 1it requires the high-energy nuclear physics com- munity’s ?compilations of high-energy nuclear data for applications

  4. An online climate database for Texas 

    E-Print Network [OSTI]

    Nordeen, Michele Lynn

    2000-01-01

    A climate database for the state of Texas has been created from daily observations made at 1336 stations throughout Texas. These stations consist of both fest-order stations and local cooperative weather stations. The ...

  5. Towards Privacy Preserving of Forensic DNA Databases 

    E-Print Network [OSTI]

    Liu, Sanmin

    2012-02-14

    Protecting privacy of individuals is critical for forensic genetics. In a kinship/identity testing, related DNA profiles between user's query and the DNA database need to be extracted. However, unrelated profiles cannot be revealed to each other...

  6. DIP: The Database of Interacting Proteins

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    The DIP Database catalogs experimentally determined interactions between proteins. It combines information from a variety of sources to create a single, consistent set of protein-protein interactions. By interaction, the DIP Database creators mean that two amino acid chains were experimentally identified to bind to each other. The database lists such pairs to aid those studying a particular protein-protein interaction but also those investigating entire regulatory and signaling pathways as well as those studying the organisation and complexity of the protein interaction network at the cellular level. The data stored within the DIP database were curated, both, manually by expert curators and also automatically using computational approaches that utilize the knowledge about the protein-protein interaction networks extracted from the most reliable, core subset of the DIP data. It is a relational database that can be searched by protein, sequence, motif, article information, and pathBLAST. The website also serves as an access point to a number of projects related to DIP, such as LiveDIP, The Database of Ligand-Receptor Partners (DLRP) and JDIP. Users have free and open access to DIP after login. [Taken from the DIP Guide and the DIP website] (Specialized Interface) (Registration Required)

  7. The KTOI Ecosystem Project Relational Database : a Report Prepared by Statistical Consulting Services for KTOI Describing the Key Components and Specifications of the KTOI Relational Database.

    SciTech Connect (OSTI)

    Shafii, Bahman [Statistical Consulting Services

    2009-09-24

    Data are the central focus of any research project. Their collection and analysis are crucial to meeting project goals, testing scientific hypotheses, and drawing relevant conclusions. Typical research projects often devote the majority of their resources to the collection, storage and analysis of data. Therefore, issues related to data quality should be of foremost concern. Data quality issues are even more important when conducting multifaceted studies involving several teams of researchers. Without the use of a standardized protocol, for example, independent data collection carried out by separate research efforts can lead to inconsistencies, confusion and errors throughout the larger project. A database management system can be utilized to help avoid all of the aforementioned problems. The centralization of data into a common relational unit, i.e. a relational database, shifts the responsibility for data quality and maintenance from multiple individuals to a single database manager, thus allowing data quality issues to be assessed and corrected in a timely manner. The database system also provides an easy mechanism for standardizing data components, such as variable names and values uniformly across all segments of a project. This is particularly an important issue when data are collected on a number of biological/physical response and explanatory variables from various locations and times. The database system can integrate all segments of a large study into one unit, while providing oversight and accessibility to the data collection process. The quality of all data collected is uniformly maintained and compatibility between research efforts ensured. While the physical database would exist in a central location, access will not be physically limited. Advanced database interfaces are created to operate over the internet utilizing a Web-based relational database, allowing project members to access their data from virtually anywhere. These interfaces provide users with the ability to upload, download, edit, and search data remotely, creating a dynamic system that is continually updated with the most recent information. At the same time, data are protected through user access restrictions, by implementing user profiles and password protected security. This accessibility could be set to any combination of read/write/edit abilities from an administrator capacity with full access to all data, to a highly restricted public access capability limited to general project information. Generation of customized summary reports and basic graphical routines could also be obtained through a Web-based interference. Using these types of features, users could produce summary tables, track trends of specified response variables over time or location, and compare results from various disciplines. Exploration of data in this manner can help users to better define and clarify their research goals and provide a means of integrating various aspects of a larger research project.

  8. NATIONAL CARBON SEQUESTRATION DATABASE AND GEOGRAPHIC INFORMATION SYSTEM (NATCARB) FORMER TITLE-MIDCONTINENT INTERACTIVE DIGITAL CARBON ATLAS AND RELATIONAL DATABASE (MIDCARB)

    SciTech Connect (OSTI)

    Timothy R. Carr

    2004-07-16

    This annual report describes progress in the third year of the three-year project entitled ''Midcontinent Interactive Digital Carbon Atlas and Relational Database (MIDCARB)''. The project assembled a consortium of five states (Indiana, Illinois, Kansas, Kentucky and Ohio) to construct an online distributed Relational Database Management System (RDBMS) and Geographic Information System (GIS) covering aspects of carbon dioxide (CO{sub 2}) geologic sequestration (http://www.midcarb.org). The system links the five states in the consortium into a coordinated regional database system consisting of datasets useful to industry, regulators and the public. The project has been extended and expanded as a ''NATional CARBon Sequestration Database and Geographic Information System (NATCARB)'' to provide national coverage across the Regional CO{sub 2} Partnerships, which currently cover 40 states (http://www.natcarb.org). Advanced distributed computing solutions link database servers across the five states and other publicly accessible servers (e.g., USGS) into a single system where data is maintained and enhanced at the local level but is accessed and assembled through a single Web portal and can be queried, assembled, analyzed and displayed. This project has improved the flow of data across servers and increased the amount and quality of available digital data. The online tools used in the project have improved in stability and speed in order to provide real-time display and analysis of CO{sub 2} sequestration data. The move away from direct database access to web access through eXtensible Markup Language (XML) has increased stability and security while decreasing management overhead. The MIDCARB viewer has been simplified to provide improved display and organization of the more than 125 layers and data tables that have been generated as part of the project. The MIDCARB project is a functional demonstration of distributed management of data systems that cross the boundaries between institutions and geographic areas. The MIDCARB system addresses CO{sub 2} sequestration and other natural resource issues from sources, sinks and transportation within a spatial database that can be queried online. Visualization of high quality and current data can assist decision makers by providing access to common sets of high quality data in a consistent manner.

  9. Better Knowledge Management Through Knowledge Engineering

    E-Print Network [OSTI]

    Preece, Alun

    Better Knowledge Management Through Knowledge Engineering: A Case Study in Drilling Optimisation management by a drilling optimisation group within a large service company. The three facets of the knowledge be built using conventional database software, special-purpose case-based reasoning or knowledge

  10. 5) Management 5) Management

    E-Print Network [OSTI]

    Nowak, Robert S.

    5) Management c) Control #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken & Thieret (1997) · Types of information utilized Ecological impacts #12;5) Management c) Control impacts Economic impacts #12;5) Management c) Control Prioritizing control ­ From Hiebert in Luken

  11. Network Management Network Management

    E-Print Network [OSTI]

    Giaccone, Paolo

    Network Management Pag. 1 Network Management Andrea Bianco Telecommunication Network Group Network management and QoS provisioning - 1Andrea Bianco ­ TNG group - Politecnico di Torino Telecommunication management and QoS provisioning - 2Andrea Bianco ­ TNG group - Politecnico di Torino Stanford, California

  12. Evaluating, Migrating, and Consolidating Databases and Applications for Long-Term Surveillance and Maintenance Activities at the Rocky Flats Site

    SciTech Connect (OSTI)

    Surovchak, S.; Marutzky, S.; Thompson, B.; Miller, K.; Labonte, E.

    2006-07-01

    The U.S. Department of Energy (DOE) Office of Legacy Management (LM) is assuming responsibilities for long-term surveillance and maintenance (LTS and M) activities at the Rocky Flats Environmental Technology Site (RFETS) during fiscal year 2006. During the transition, LM is consolidating databases and applications that support these various functions into a few applications which will streamline future management and retrieval of data. This paper discussed the process of evaluating, migrating, and consolidating these databases and applications for LTS and M activities and provides lessons learned that will benefit future transitions. (authors)

  13. Ris-R-1472(EN) Database on Wind Characteristics

    E-Print Network [OSTI]

    Risř-R-1472(EN) Database on Wind Characteristics Contents of Database Bank, revision I Gunner C on Wind Characteristics Contents of the database, revision I Abstract The main objective of IEA R&D Wind Annex XVII - Database on Wind Characteristics - has been to provide wind energy planners, designers

  14. DYNAMIC DATABASE INTEGRATION IN A JDBC DRIVER Terrence Mason

    E-Print Network [OSTI]

    Lawrence, Ramon

    -lawrence@uiowa.edu Keywords: integration, database, schema, metadata, annotation, evolution, dynamic, JDBC, conceptualDYNAMIC DATABASE INTEGRATION IN A JDBC DRIVER Terrence Mason Iowa Database and Emerging Iowa Database and Emerging Applications Laboratory, Computer Science University of Iowa Email: ramon

  15. Automating Database Schema Evolution in Information System Upgrades

    E-Print Network [OSTI]

    Zaniolo, Carlo

    Automating Database Schema Evolution in Information System Upgrades Carlo Curino Hyun J. Moon Carlo, and down-time currently created by the database schema evolution process is the source of incessant prob and historical queries for database archives under schema evolution. Keywords Schema Evolution, Database Design

  16. Predictive Database Schema Evolution Hassina BOUNIF, Stefano SPACCAPIETRA

    E-Print Network [OSTI]

    Madiraju, Praveen

    Predictive Database Schema Evolution Hassina BOUNIF, Stefano SPACCAPIETRA Database Laboratory (LBD.spaccapietra@epfl.ch Abstract: This paper proposes a new approach for organizing the evolution of existing database system and easy-to-evolve database schema. Evolution algorithms are tailored to choose the best evolution

  17. Single Database Private Information Retrieval with Logarithmic Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single Database Private Information Retrieval with Logarithmic Communication Yan-Cheng Chang of single database private information retrieval, and present schemes with only logarithmic server database private information retrieval (1dPIR) is a cryptographic protocol between a database server, who

  18. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use Chapter 7: Relational Database DesignChapter 7: Relational Database Design #12;©Silberschatz, Korth and Sudarshan7.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 7: Relational

  19. October 6, 1997 ITER L-Mode Con nement Database

    E-Print Network [OSTI]

    October 6, 1997 ITER L-Mode Con nement Database S.M. Kaye and the ITER Con nement Database Working Group Abstract This paper describes the content of an L-mode database that has been compiled with data, and Tore-Supra. The database consists of a total of 2938 entries, 1881 of which are in the L-phase while

  20. A Database of Invariant Rings Gregor Kemper, Elmar K

    E-Print Network [OSTI]

    Malle, Gunter

    A Database of Invariant Rings Gregor Kemper, Elmar K Ë? ording, Gunter Malle, B. Heinrich Matzat, Denis Vogel, and Gabor Wiese CONTENTS 1. Introduction 2. Concepts of the Database 3. An Example Session/8­2 (``Invariantentheorie endlicher Gruppen''). We announce the creation of a database of invariant rings. This database

  1. Single Database Private Information Retrieval with Logarithmic Communication

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Single Database Private Information Retrieval with Logarithmic Communication Yan­Cheng Chang of single database private information retrieval, and present schemes with only logarithmic server Single database private information retrieval (1dPIR) is a cryptographic protocol between a database

  2. Private Database Queries Using Somewhat Homomorphic Craig Gentry

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Private Database Queries Using Somewhat Homomorphic Encryption Dan Boneh Craig Gentry Shai Halevi Frank Wang David J. Wu Abstract In a private database query system, a client issues queries to a database and obtains the results with- out learning anything else about the database and without the server

  3. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.db-book.com for conditions on re-use Chapter 3: SQLChapter 3: SQL #12;©Silberschatz, Korth and Sudarshan3.2Database System of the Database Joined Relations** #12;©Silberschatz, Korth and Sudarshan3.3Database System Concepts, 5th Edition

  4. I. Course Particulars Number & Title ICS 434 ADVANCED DATABASE SYSTEMS

    E-Print Network [OSTI]

    Adam, Salah

    Description Advanced data models: object-oriented model, and object-relational model, conceptual database. Course Objectives 1. To learn advanced data modeling techniques. 2. To learn how modern database systems an automated database design tool to design complex database systems. 2. Apply object-relational data model

  5. Querying RDF Data from a Graph Database Perspective

    E-Print Network [OSTI]

    Baeza-Yates, Ricardo

    }@dcc.uchile.cl Agenda · Motivations, Problem and Proposal · Database Models · Graph Database Models · RDF as data model of data model with inherent graph structure. · Database models and query languages should support its that a query language for RDF should provide. Database Models Data structures Operators and Query Language

  6. Sex Work in Second Life: Scripts, presence, and Bounded Authenticity in a Virtual Environment

    E-Print Network [OSTI]

    Lynch, Michael J.

    2010-01-01

    from the Internet of 1994. Conclusion $V#3;ŔHGJOLQJ#3; WHFKQRORJLHV#3; RI#3; WKH#3; SDVW#3; KDYH#3; RIWHQ#3; EHHQ#3;żUVW#3; exploited for sexual purposes4, an argument could be made that 4#3;6XFK#3;DV#3;KRZ#3;WKH#3;żUVW#3;PRYLQJ#3... signal a heightened sense of intimacy and is a premium feature of virtual sex as an erotic service. These żQGLQJV#3;SURYLGH#3;IXUWKHU#3;HYLGHQFH#3;IRU#3;%HUQVWHLQ¶V#3;QRWLRQ#3;RI#3;ERXQGHG#3; authenticity, as virtual sex is a...

  7. Managing Schema Evolution using a Temporal Object Model Iqbal A. Goralwalla, Duane Szafron, M. Tamer Ozsu

    E-Print Network [OSTI]

    Szafron, Duane

    of schema evolution and temporal support for many object database management systems applications can be used to investigate advanced database features such as schema evolution. GivenManaging Schema Evolution using a Temporal Object Model Iqbal A. Goralwalla, Duane Szafron, M

  8. Designing a future Conditions Database based on LHC experience

    E-Print Network [OSTI]

    Formica, Andrea; The ATLAS collaboration; Gallas, Elizabeth; Govi, Giacomo; Lehmann Miotto, Giovanna; Pfeiffer, Andreas

    2015-01-01

    The ATLAS and CMS Conditions Database infrastructures have served each of the respective experiments well through LHC Run 1, providing efficient access to a wide variety of conditions information needed in online data taking and offline processing and analysis. During the long shutdown between Run 1 and Run 2, we have taken various measures to improve our systems for Run 2. In some cases, a drastic change was not possible because of the relatively short time scale to prepare for Run 2. In this process, and in the process of comparing to the systems used by other experiments, we realized that for Run 3, we should consider more fundamental changes and possibilities. We seek changes which would streamline conditions data management, improve monitoring tools, better integrate the use of metadata, incorporate analytics to better understand conditions usage, as well as investigate fundamental changes in the storage technology, which might be more efficient while minimizing maintenance of the data as well as simplif...

  9. Mining Software Usage with the Automatic Library Tracking Database (ALTD)

    SciTech Connect (OSTI)

    Hadri, Bilel [ORNL; Fahey, Mark R [ORNL

    2013-01-01

    Tracking software usage is important for HPC centers, computer vendors, code developers and funding agencies to provide more efficient and targeted software support, and to forecast needs and guide HPC software effort towards the Exascale era. However, accurately tracking software usage on HPC systems has been a challenging task. In this paper, we present a tool called Automatic Library Tracking Database (ALTD) that has been developed and put in production on several Cray systems. The ALTD infrastructure prototype automatically and transparently stores information about libraries linked into an application at compilation time and also the executables launched in a batch job. We will illustrate the usage of libraries, compilers and third party software applications on a system managed by the National Institute for Computational Sciences.

  10. MAC, material accounting database user guide

    SciTech Connect (OSTI)

    Russell, V.K.

    1994-09-22

    The K Basins Material Accounting (MAC) database system user guide describes the user features and functions, and the document is structured like the database menus. This document presents the MAC database system user instructions which explain how to record the movements and configuration of canisters and materials within the K Basins on the computer, the mechanics of handling encapsulation tracking, and administrative functions associated with the system. This document includes the user instructions, which also serve as the software requirements specification for the system implemented on the microcomputer. This includes suggested user keystrokes, examples of screens displayed by the system, and reports generated by the system. It shows how the system is organized, via menus and screens. It does not explain system design nor provide programmer instructions.

  11. Online interaction database: What have we learned

    E-Print Network [OSTI]

    Zadezensky, I.; de Castro, W.; Meyer, J.; Butterweck, V.; Derendorf, H.

    2006-10-25

    ?[Citrus?Reference?Book] 1Center?for?Food?and?Drug?Interaction?Research?and?Education,?University?of?Florida,?Gainesville,?FL Online?Database?For?Grapefruit?Juice?Drug?Interactions:?What?Have?We?Learned?? I.?Zadezensky1,?W.V.?de?Castro1,??J.?Meyer1,?V...?[Citrus?Reference?Book] 1Center?for?Food?and?Drug?Interaction?Research?and?Education,?University?of?Florida,?Gainesville,?FL Online?Database?For?Grapefruit?Juice?Drug?Interactions:?What?Have?We?Learned?? I.?Zadezensky1,?W.V.?de?Castro1,??J.?Meyer1,?V...

  12. Correlations Between Homeowner Mold Insurance Claims and Weather Databases in Texas 

    E-Print Network [OSTI]

    Kosar, D.; Nikolovski, D.

    2006-01-01

    Homeowner Mold Insurance Claims and Weather Databases in Texas Douglas Kosar Dragan Nikolovski Principal Research Engineer Visiting Research Engineer Energy Resources Center Department of Mechanical and Industrial Engineering College of Engineering... University of Illinois at Chicago Chicago, Illinois ABSTRACT Limiting moisture problems and mold growth in homes requires both controlling moisture levels in interior spaces, and managing water vapor transport and bulk water intrusion in the building...

  13. IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for

    E-Print Network [OSTI]

    Shen, Xuemin "Sherman"

    IEEE TRANSACTIONS ON SMART GRID, VOL. 2, NO. 4, DECEMBER 2011 675 A Lightweight Message Authentication Scheme for Smart Grid Communications Mostafa M. Fouda, Member, IEEE, Zubair Md. Fadlullah, Member Abstract--Smart grid (SG) communication has recently received significant attentions to facilitate

  14. Learning Bayesian Networks for Relational Databases

    E-Print Network [OSTI]

    Glymour, Clark

    Learning Bayesian Networks for Relational Databases Oliver Schulte School of Computing Science > 3.0. Multi-billion dollar industry, $15+ bill in 2006. IBM, Microsoft, Oracle, SAP. Much interest. Defining model selection scores. Computing sufficient statistics. Work in Progress. Anomaly Detection

  15. Using Delay to Defend Against Database Extraction

    E-Print Network [OSTI]

    Cafarella, Michael J.

    a business in competition. This attacker could attempt to hack into the provider's system ­ such attacks, the "crown jewels" of their business are the data that they have organized. If someone could copy their entire database, it would be a competitive catastrophe. Yet, a data provider is in the business

  16. World Gasification Database Now Available from DOE

    Broader source: Energy.gov [DOE]

    A database just released by the U.S. Department of Energy documents the worldwide growth of gasification, the expected technology of choice for future coal-based plants that produce power, fuels, and/or chemicals with near-zero emissions.

  17. Hypercat : A Database for extragalactic astronomy

    E-Print Network [OSTI]

    Ph. Prugniel; G. Maubon

    1999-10-01

    The Hypercat Database is developed at Observatoire de Lyon and is distributed on the WEB through different mirrors in Europe. The goal of Hypercat is to gather data necessary for studying the evolution of galaxies (dynamics and stellar contains) and particularly for providing a z=0 reference for these studies.

  18. Qunits: queried units in database search

    E-Print Network [OSTI]

    Nandi, Arnab

    2009-01-01

    Keyword search against structured databases has become a popular topic of investigation, since many users find structured queries too hard to express, and enjoy the freedom of a ``Google-like'' query box into which search terms can be entered. Attempts to address this problem face a fundamental dilemma. Database querying is based on the logic of predicate evaluation, with a precisely defined answer set for a given query. On the other hand, in an information retrieval approach, ranked query results have long been accepted as far superior to results based on boolean query evaluation. As a consequence, when keyword queries are attempted against databases, relatively ad-hoc ranking mechanisms are invented (if ranking is used at all), and there is little leverage from the large body of IR literature regarding how to rank query results. Our proposal is to create a clear separation between ranking and database querying. This divides the problem into two parts, and allows us to address these separately. The first tas...

  19. Knowledge Discovery in Spatial Databases Martin Ester

    E-Print Network [OSTI]

    Ester, Martin

    and their interactions with each other. Most companies, governmental agencies and scientific organizations use DBMS with ex­ isting DBMS. Thus, the second goal is to propose methods of efficiently supporting spatial data mining algorithms by a DBMS. Our approach centers around a new set of database primitives for mining

  20. Case for Staged Database Systems Stavros Harizopoulos

    E-Print Network [OSTI]

    increasing demands performance, high­end DBMS employ parallel processing techniques coupled with plethora­ lithic approach DBMS software lead complex difficult to extend designs. paper introduces a staged design high­per­ formance, evolvable DBMS that tune maintain. propose break the database system into modules

  1. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL and Java Database Systems Lecture 19 Natasha Alechina SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 SQL and Java SQL and Other

  2. SQL and Java Database Systems Lecture 19

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL and Java Database Systems Lecture 19 Natasha Alechina #12;SQL and Java In this Lecture · SQL in Java · SQL from within other Languages · SQL, Java, and JDBC · For More Information · Sun Java tutorial: http://java.sun.com/docs/books/tutorial/jdbc · Connolly and Begg 29.7 #12;SQL and Java SQL and Other

  3. SQL Data Definition Database Systems Lecture 5

    E-Print Network [OSTI]

    Alechina, Natasha

    SQL Data Definition Database Systems Lecture 5 Natasha Alechina #12;SQL Data Definition In This Lecture · SQL · The SQL language · SQL, the relational model, and E/R diagrams · CREATE TABLE · Columns.6. #12;SQL Data Definition SQL · Originally `Sequel' - Structured English query Language, part of an IBM

  4. SQL Data Definition Database Systems Lecture 5

    E-Print Network [OSTI]

    Alechina, Natasha

    1 SQL Data Definition Database Systems Lecture 5 Natasha Alechina SQL Data Definition In This Lecture · SQL · The SQL language · SQL, the relational model, and E/R diagrams · CREATE TABLE · Columns.6. SQL Data Definition SQL · Originally `Sequel' - Structured English query Language, part of an IBM

  5. Identifying Relevant Databases for Multidatabase Mining

    E-Print Network [OSTI]

    Liu, Huan

    Identifying Relevant Databases for Multidatabase Mining Huan Liu, Hongjun Lu, Jun Yao Department,luhj,yaojung@iscs.nus.edu.sg Abstract. Various tools and systems for knowledge discovery and data mining are developed and available is where we should start mining. In this paper, breaking away from the conventional data mining assumption

  6. CEBAF Large Acceptance Spectrometer (CLAS) Physics Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    A username and password are required to access and search the entire database. However, the Overview page provides links to detailed data pages for each of the experiments available for public access. There are many experiments with data that the public can freely access.

  7. CP'96 Page 1 Constraint Databases

    E-Print Network [OSTI]

    Goldin, Dina Q.

    CP'96 Page 1 Constraint Databases: a lecture in honor of Paris C. Kanellakis Dina Q. Goldin Brown University CP'96 Page 2 Here went the group photo from CP'95 taken from Paris' memorial page http://www.cs.brown.edu/people/pck #12;CP'96 Page 3 Paris C. Kanellakis: professor, Brown University, 1981-1995 here went the Paris

  8. General Database Statistics Using Entropy Maximization

    E-Print Network [OSTI]

    Suciu, Dan

    (z) Estimate: q(y) :- R(x, y), S(y, z) Fig. 1. An example of a Statistical Program and a query, q whoseGeneral Database Statistics Using Entropy Maximization Raghav Kaushik1 , Christopher R´e2 , and Dan engines. The key object of our study is a statistical program, which is a set of pairs (v, d), where v

  9. Proc. 4th RADC Workshop on Multilevel Database Security, Rhode Island, April 1991, pages 122-126.

    E-Print Network [OSTI]

    Sandhu, Ravi

    22030-4444 1 INTRODUCTION A database management system DBMS is a superb tool for building e ective infor- mation systems. The widespread use of DBMS's across the board, from stand-alone personal computers at one and acceptance of this technology. It is therefore no surprise that there is signi cant interest in trusted DBMS

  10. DESIGN CONCEPTS AND IMPLEMENTATION OF DATABASES , Gio Wiederhold, INTRODUCTION, Chapter 1, file D1CID.TEX April 4, 1996

    E-Print Network [OSTI]

    Wiederhold, Gio

    Background and Refernces An extensive history First moving pictures: 1834, William George Horner management system (DBMS) is a collection of programs which uses computers to store, maintain, and interrogate the database. To support the DBMS we require not only hardware, by operating systems and file system services

  11. SEMANTIC WEB APPROACH TO DATABASE INTEGRATION IN THE LIFE SCIENCES

    E-Print Network [OSTI]

    Gerstein, Mark

    of the Human Genome Project (HGP) [1] together with the popularity of the Web (or World Wide Web) [2] has made the inception of HGP, a multitude of Web accessible biological databases have emerged. These databases differ

  12. DB-PABP: a database of polyanion-binding proteins

    E-Print Network [OSTI]

    Fang, Jianwen; Dong, Yinghua; Slamat-Miller, Nazila; Middaugh, C. Russell

    2007-10-04

    scattered, suggesting the need for a comprehensive and searchable database of PABPs. The DB-PABP is a comprehensive, manually curated and searchable database of experimentally characterized PABPs. It is freely available and can be accessed online at http...

  13. U.S. Life Cycle Inventory Database Roadmap (Brochure) | Department...

    Office of Energy Efficiency and Renewable Energy (EERE) Indexed Site

    U.S. Life Cycle Inventory Database Roadmap (Brochure) U.S. Life Cycle Inventory Database Roadmap (Brochure) Life cycle inventory data are the primary inputs for conducting life...

  14. Query-based database policy assurance using semantic web technologies

    E-Print Network [OSTI]

    Soltren, José Hiram

    2009-01-01

    In this thesis, we present a novel approach to database security which looks at queries instead of the database tables themselves. In doing so, we use a number of Semantic Web technologies to define rules, translate queries, ...

  15. Spinal palpation: The challenges of information retrieval using available databases

    E-Print Network [OSTI]

    2003-01-01

    Databases Linda S. Murphy, MLIS, Sibylle Reinsch, PhD, Wadieto: Linda S. Murphy, MLIS Susan Samueli Center for

  16. Rocky Mountain Basins Produced Water Database

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Historical records for produced water data were collected from multiple sources, including Amoco, British Petroleum, Anadarko Petroleum Corporation, United States Geological Survey (USGS), Wyoming Oil and Gas Commission (WOGC), Denver Earth Resources Library (DERL), Bill Barrett Corporation, Stone Energy, and other operators. In addition, 86 new samples were collected during the summers of 2003 and 2004 from the following areas: Waltman-Cave Gulch, Pinedale, Tablerock and Wild Rose. Samples were tested for standard seven component "Stiff analyses", and strontium and oxygen isotopes. 16,035 analyses were winnowed to 8028 unique records for 3276 wells after a data screening process was completed. [Copied from the Readme document in the zipped file available at http://www.netl.doe.gov/technologies/oil-gas/Software/database.html] Save the Zipped file to your PC. When opened, it will contain four versions of the database: ACCESS, EXCEL, DBF, and CSV formats. The information consists of detailed water analyses from basins in the Rocky Mountain region.

  17. Stout: Cloudy's Atomic and Molecular Database

    E-Print Network [OSTI]

    Lykins, M L; Kisielius, R; Chatzikos, M; Porter, R L; van Hoof, P A M; Williams, R J R; Keenan, F P; Stancil, P C

    2015-01-01

    We describe a new atomic and molecular database we developed for use in the spectral synthesis code Cloudy. The design of Stout is driven by the data needs of Cloudy, which simulates molecular, atomic, and ionized gas with kinetic temperatures 2.8 K data are stored in a format as close as possible to the original data sources. Few data sources include the full range of data we need. We describe how we fill in the gaps in the data or extrapolate rates beyond their tabulated range. We tabulate data sources both for the atomic spectroscopic parameters and for collision data for the next release of Cloudy. This is not intended as a review of the current status of atomic data, but rather a description of the features of the database which we will build ...

  18. DAPS: Database of Aligned Protein Structures

    DOE Data Explorer [Office of Scientific and Technical Information (OSTI)]

    Mallick, Parag; Rice, Danny; Eisenberg, David

    How is DAPS constructed? We begin with the set of all chains from the current release of the PDB. An all on all search is done on the list to find pairs that have the same fold acoording to both the FSSP and CATH databases and clustered into groups by a representative structure (representative structures have less than 25% sequence identity to each other). For each protein pair, regions aligned by the DALI program are extracted from the corresponding FSSP file, or recomputed using DALI-lite. In domain DAPS, only regions that are called "domains" by CATH are included in the alignment. The amino acid type, secondary structure type, and solvent accessibility are extracted from the DSSP file and written pairwise into the database. DAPS is updated with updates of CATH.[Taken from http://nihserver.mbi.ucla.edu/DAPS/daps_help.html

  19. Estimating Pedestrian Accident Exposure: Approaches to a Statewide Pedestrian Exposure Database

    E-Print Network [OSTI]

    Greene-Roesel, Ryan; Diogenes, Mara Chagas; Ragland, David R

    2007-01-01

    Pedestrian Exposure Database, March 23, 2007 Federal TransitNational Transit Database. http://www.ntdprogram.gov/Implementation of a National Database of Air Passenger

  20. A database for the study of marine mammal behavior: Gap analysis, data standardization, and future directions

    E-Print Network [OSTI]

    Shaffer, S A; Costa, Daniel P

    2006-01-01

    directly for copies of the database and bib- liography. RCommunication _____________ A Database for the Study ofAbstract—A relational database that contained published

  1. A KNOWLEDGE BASED SYSTEM FOR PROVIDING INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE

    E-Print Network [OSTI]

    Rosenberg, Steven

    2011-01-01

    INTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE StevenINTELLIGENT ACCESS TO A PETROLEUM USER DATABASE Steven

  2. Gasification world database 2007. Current industry status

    SciTech Connect (OSTI)

    NONE

    2007-10-15

    Information on trends and drivers affecting the growth of the gasification industry is provided based on information in the USDOE NETL world gasification database (available on the www.netl.doe.gov website). Sectors cover syngas production in 2007, growth planned through 2010, recent industry changes, and beyond 2010 - strong growth anticipated in the United States. A list of gasification-based power plant projects, coal-to-liquid projects and coal-to-SNG projects under consideration in the USA is given.

  3. Preparing a public database of radio sources

    E-Print Network [OSTI]

    H. Andernach; S. A. Trushkin; A. G. Gubanov; O. V. Verkhodanov; V. B. Titov; A. Micol

    1996-07-22

    We have collected the largest existing set of radio source lists in machine-readable form: 320 tables with 1.75 million records. Only a minor fraction of these is accessible via public databases. We describe our plans to make this huge amount of heterogeneous data accessible in a homogeneous way via the World Wide Web, with reliable cross-identifications, and searchable by various observables.

  4. Ris-R-1473(EN) Database on Wind Characteristics

    E-Print Network [OSTI]

    Risř-R-1473(EN) Database on Wind Characteristics Analyses of Wind Turbine Design Loads Gunner C R&D Wind Annex XVII - Database on Wind #12;IEA Annex XVII, Database on Wind Characteristics Analyses of W Characteristics - has been to provide wind energy planners, designers and researchers, as well

  5. Bridging Relational Database History and the Web: the XML Approach

    E-Print Network [OSTI]

    Zaniolo, Carlo

    Bridging Relational Database History and the Web: the XML Approach Fusheng Wang Integrated Data and queries, and make it easy to pub- lish database history to the Web. In this paper, we focus on the problem of preserving, publishing, and querying ef- ficiently the history of a relational database. Past research

  6. Efficient Temporal Coalescing Query Support in Relational Database Systems

    E-Print Network [OSTI]

    Zaniolo, Carlo

    demand for temporal databases have only in- creased with time; unfortunately, DBMS vendors and standard by the lessons learned from the very history of temporal databases, where past proposals failed to gain much temporal query models with current DBMS engines [5]. Even if temporal database and query model can be well

  7. SCDBR: An Automated Reasoner for Database (Extended Abstract)

    E-Print Network [OSTI]

    Bertossi, Leopoldo

    . In general, theories of action and change, such as the specification of the evolution of a database, includeSCDBR: An Automated Reasoner for Database Updates (Extended Abstract) Leopoldo Bertossi, Marcelo In this paper we describe SCDBR, a system that automates reasoning with specifications of database updates

  8. Efficien and Scalable Data Evolution with Column Oriented Databases

    E-Print Network [OSTI]

    Chen, Yi

    Efficien and Scalable Data Evolution with Column Oriented Databases Ziyang Liu1 , Bin He2 , Hui@us.ibm.com, hhsiao@almaden.ibm.com, yi@asu.edu ABSTRACT Database evolution is the process of updating the schema of a database or data warehouse (schema evolution) and e- volving the data to the updated schema (data evolution

  9. Requirements Ontology and Multirepresentation Strategy for Database Schema Evolution 1

    E-Print Network [OSTI]

    Pottinger, Rachel

    Requirements Ontology and Multirepresentation Strategy for Database Schema Evolution 1 Hassina important utilization field of ontology related to database schemas and which is schema evolution topic and which is related to information systems. That is database schema evolution, an important, complex

  10. CODS: Evolving Data Efficiently and Scalably in Column Oriented Databases

    E-Print Network [OSTI]

    Chen, Yi

    evolution is the process of updating the schema of a database or data warehouse (schema evolution) and evolving the data to the updated schema (data evolution). Database evolution is often necessitated processing, evolving the data during a database evolution through SQL queries is shown to be prohibitively

  11. Dynamic Functional DependenciesandDatabaseAging VICTOR VIANU

    E-Print Network [OSTI]

    Madiraju, Praveen

    of dynamic constraints on database evolution. Both static and dynamic constraints are used in conjunction future evolution of the database is briefly discussedusing the notions of survivability and survivability in the real world concerns the laws that govern their evolution in time. Many database models capture

  12. Temporal Conditions and Integrity Constraints in Active Database Systems \\Lambda

    E-Print Network [OSTI]

    Wolfson, Ouri E.

    to specify conditions that involve both, events and database states, and their evolution over time. BasicallyTemporal Conditions and Integrity Constraints in Active Database Systems \\Lambda A. Prasad Sistla, for specifying conditions and events in the rules for active database sys­ tem. This language permits

  13. The SUPERFAMILY database in 2007: families and functions

    E-Print Network [OSTI]

    -level functional annotation. The SUPERFAMILY database can be used for general protein evolution and superfamilyThe SUPERFAMILY database in 2007: families and functions Derek Wilson*, Martin Madera1 , Christine The SUPERFAMILY database provides protein domain assignments, at the SCOP `superfamily' level, for the predicted

  14. Development of the Global Earthquake Model's neotectonic fault database

    E-Print Network [OSTI]

    New Hampshire, University of

    Development of the Global Earthquake Model's neotectonic fault database Annemarie Christophersen1 database and a unique graphical interface for the compilation of new fault data. A key design principle is that of an electronic field notebook for capturing observations a geologist would make about a fault. The database

  15. Efficient Consistency Proofs for Generalized Queries on a Committed Database

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Efficient Consistency Proofs for Generalized Queries on a Committed Database Rafail Ostrovsky UCLA@csail.mit.edu July 20, 2004 Abstract A consistent query protocol (CQP) allows a database owner to publish a very short string c which commits her and everybody else to a particular database D, so that any copy

  16. Secure Database Commitments and Universal Arguments of Quasi Knowledge

    E-Print Network [OSTI]

    International Association for Cryptologic Research (IACR)

    Secure Database Commitments and Universal Arguments of Quasi Knowledge Melissa Chase Microsoft@dia.unisa.it Abstract In this work we focus on a simple database commitment functionality where besides the standard) of the proposed functionality. The first result of this submission consists in defining "secure" database

  17. THE DESIGN AND IMPLEMENTATION OF A DATA LEVEL DATABASE

    E-Print Network [OSTI]

    Yoo, S. J. Ben

    THE DESIGN AND IMPLEMENTATION OF A DATA LEVEL DATABASE INFERENCE DETECTION SYSTEM Raymond W. Yip and Karl N. Levitt Abstract: Inference is a way to subvert access control mechanisms of database systems. Most existing work on inference detection relies on analyzing func- tional dependencies in the database

  18. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www.2Database System Concepts, 5th Edition, Oct 5. 2006 Chapter 4: Advanced SQLChapter 4: Advanced SQL SQL Data Constructs** Recursive Queries** Advanced SQL Features** #12;©Silberschatz, Korth and Sudarshan4.3Database

  19. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www, Korth and Sudarshan12.2Database System Concepts - 5th Edition, Oct 4, 2006 Chapter 12: Indexing Multiple-Key Access #12;©Silberschatz, Korth and Sudarshan12.3Database System Concepts - 5th Edition, Oct 4

  20. Database System Concepts, 5th Ed. Silberschatz, Korth and Sudarshan

    E-Print Network [OSTI]

    Dragan, Feodor F.

    Database System Concepts, 5th Ed. ©Silberschatz, Korth and Sudarshan See www;©Silberschatz, Korth and Sudarshan6.2Database System Concepts - 5th Edition, Oct 5, 2006 Chapter 6: Entity Design Issues Weak Entity Sets Extended E-R Features Design of the Bank Database Reduction to Relation